In the Linux kernel, the following vulnerability has been resolved: KEYS: trusted: Fix memory leak in tpm2_key_encode() 'scratch' is never freed. Fix this by calling kfree() in the success, and in the error case.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.