CVE-2024-36967Missing Release of Memory after Effective Lifetime in Linux

Severity
5.5MEDIUMNVD
OSV6.5
EPSS
0.0%
top 94.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 8
Latest updateSep 18

Description

In the Linux kernel, the following vulnerability has been resolved: KEYS: trusted: Fix memory leak in tpm2_key_encode() 'scratch' is never freed. Fix this by calling kfree() in the success, and in the error case.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages9 packages

Patches

🔴Vulnerability Details

14
OSV
linux-xilinx-zynqmp vulnerabilities2024-09-18
OSV
linux-hwe-5.15 vulnerabilities2024-08-21
OSV
linux-oracle-5.15 vulnerabilities2024-08-13
OSV
linux-oracle vulnerabilities2024-08-13
OSV
linux-lowlatency, linux-raspi vulnerabilities2024-08-13

📋Vendor Advisories

14
Ubuntu
Linux kernel vulnerabilities2024-09-18
Ubuntu
Linux kernel (HWE) vulnerabilities2024-08-21
Ubuntu
Linux kernel (Oracle) vulnerabilities2024-08-13
Ubuntu
Linux kernel (Oracle) vulnerabilities2024-08-13
Ubuntu
Linux kernel vulnerabilities2024-08-13

💬Community

1
Bugzilla
CVE-2024-36967 kernel: KEYS: trusted: Fix memory leak in tpm2_key_encode()2024-06-14