CVE-2024-36967

Source
https://cve.org/CVERecord?id=CVE-2024-36967
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36967.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-36967
Downstream
Related
Published
2024-06-08T12:52:59.895Z
Modified
2026-03-14T12:34:17.271071Z
Summary
KEYS: trusted: Fix memory leak in tpm2_key_encode()
Details

In the Linux kernel, the following vulnerability has been resolved:

KEYS: trusted: Fix memory leak in tpm2keyencode()

'scratch' is never freed. Fix this by calling kfree() in the success, and in the error case.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/36xxx/CVE-2024-36967.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f2219745250f388edacabe6cca73654131c67d0a
Fixed
1e6914fa8e7798bcf3ce4a5b96ea4ac1d5571cdf
Fixed
5d91238b590bd883c86ba7707c5c9096469c08b7
Fixed
e62835264d0352be6086975f18fdfed2b5520b13
Fixed
189c768932d435045b1fae12bf63e53866f06a28
Fixed
cf26a92f560eed5d6ddc3d441cc645950cbabc56
Fixed
ffcaa2172cc1a85ddb8b783de96d38ca8855e248

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36967.json"