CVE-2026-31391
Description
In the Linux kernel, the following vulnerability has been resolved:
crypto: atmel-sha204a - Fix OOM ->tfm_count leak
If memory allocation fails, decrement ->tfm_count to avoid blocking future reads.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's atmel-sha204a crypto driver, a missing tfm_count decrement on OOM can permanently block future cryptographic operations.
Vulnerability
CVE-2026-31391 is a reference-count leak in the atmel-sha204a cryptographic driver within the Linux kernel [1][2][3][4]. When memory allocation fails during a cryptographic operation, the driver increments ->tfm_count but neglects to decrement it on the subsequent error path. This oversight allows the count to become permanently elevated if an out-of-memory (OOM) condition occurs [1].
Attack
Surface
The vulnerability affects the Atmel SHA-204A hardware crypto accelerator driver. Exploitation requires that a local user or a process causes the driver to encounter an OOM situation during a crypto operation, which could be triggered by exhausting system memory while using the cryptographic device [1]. No authentication is needed beyond the ability to interact with the crypto subsystem.
Impact
An elevated ->tfm_count blocks all future reads from the crypto accelerator because the count is checked as a guard condition. This results in a denial of service for any process that depend on hardware-backed cryptographic operations, potentially affecting system availability or the function of security mechanisms that rely on the atmel-sha204a driver [1].
Mitigation
Patches have been committed to the stable Linux kernel tree. The fix adds the missing decrement of ->tfm_count on the failure path. Users should update their kernel to include the backported commit from the stable branches [1][2][3][4]. There is no evidence this vulnerability is currently listed on CISA's Known Exploited Vulnerabilities catalog.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- git.kernel.org/stable/c/1ab70c260cf16f931a728b2cb63fff5f38c814d8nvd
- git.kernel.org/stable/c/2bfc83cee05f8b9604502df27d94e8e2b4a3dbf1nvd
- git.kernel.org/stable/c/66ee9c1c3575b5d6afc340faca00fd40ed5b7ad9nvd
- git.kernel.org/stable/c/6f502049a96b368ea6646c49d9520d6f69a101fanvd
- git.kernel.org/stable/c/c2d0c45dbb9eb272385ae919b17eef5a5318d3f8nvd
- git.kernel.org/stable/c/d240b079a37e90af03fd7dfec94930eb6c83936envd
- git.kernel.org/stable/c/fd262dc6d758232511127372eba866b7600739banvd
News mentions
0No linked articles in our index yet.