{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-71147","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2026-01-13T15:30:19.662Z","datePublished":"2026-01-23T14:15:13.945Z","dateUpdated":"2026-05-11T21:55:53.398Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:55:53.398Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nKEYS: trusted: Fix a memory leak in tpm2_load_cmd\n\n'tpm2_load_cmd' allocates a tempoary blob indirectly via 'tpm2_key_decode'\nbut it is not freed in the failure paths. Address this by wrapping the blob\ninto with a cleanup helper."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["security/keys/trusted-keys/trusted_tpm2.c"],"versions":[{"version":"f2219745250f388edacabe6cca73654131c67d0a","lessThan":"3fd7df4636d8fd5e3592371967a5941204368936","status":"affected","versionType":"git"},{"version":"f2219745250f388edacabe6cca73654131c67d0a","lessThan":"af0689cafb127a8d1af78cc8b72585c9b2a19ecd","status":"affected","versionType":"git"},{"version":"f2219745250f388edacabe6cca73654131c67d0a","lessThan":"19166de9737218b77122c41a5730ac87025e089f","status":"affected","versionType":"git"},{"version":"f2219745250f388edacabe6cca73654131c67d0a","lessThan":"9b015f2918b95bdde2ca9cefa10ef02b138aae1e","status":"affected","versionType":"git"},{"version":"f2219745250f388edacabe6cca73654131c67d0a","lessThan":"9e7c63c69f57b1db1a8a1542359a6167ff8fcef1","status":"affected","versionType":"git"},{"version":"f2219745250f388edacabe6cca73654131c67d0a","lessThan":"62cd5d480b9762ce70d720a81fa5b373052ae05f","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["security/keys/trusted-keys/trusted_tpm2.c"],"versions":[{"version":"5.13","status":"affected"},{"version":"0","lessThan":"5.13","status":"unaffected","versionType":"semver"},{"version":"5.15.198","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.160","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.120","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.64","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.18.3","lessThanOrEqual":"6.18.*","status":"unaffected","versionType":"semver"},{"version":"6.19","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13","versionEndExcluding":"5.15.198"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13","versionEndExcluding":"6.1.160"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13","versionEndExcluding":"6.6.120"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13","versionEndExcluding":"6.12.64"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13","versionEndExcluding":"6.18.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.13","versionEndExcluding":"6.19"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/3fd7df4636d8fd5e3592371967a5941204368936"},{"url":"https://git.kernel.org/stable/c/af0689cafb127a8d1af78cc8b72585c9b2a19ecd"},{"url":"https://git.kernel.org/stable/c/19166de9737218b77122c41a5730ac87025e089f"},{"url":"https://git.kernel.org/stable/c/9b015f2918b95bdde2ca9cefa10ef02b138aae1e"},{"url":"https://git.kernel.org/stable/c/9e7c63c69f57b1db1a8a1542359a6167ff8fcef1"},{"url":"https://git.kernel.org/stable/c/62cd5d480b9762ce70d720a81fa5b373052ae05f"}],"title":"KEYS: trusted: Fix a memory leak in tpm2_load_cmd","x_generator":{"engine":"bippy-1.2.0"}}}}