{"id":"CVE-2024-42229","summary":"crypto: aead,cipher - zeroize key buffer after use","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: aead,cipher - zeroize key buffer after use\n\nI.G 9.7.B for FIPS 140-3 specifies that variables temporarily holding\ncryptographic information should be zeroized once they are no longer\nneeded. Accomplish this by using kfree_sensitive for buffers that\npreviously held the private key.","modified":"2026-03-20T12:38:43.802245Z","published":"2024-07-30T07:47:09.817Z","related":["MGASA-2024-0277","MGASA-2024-0278","SUSE-SU-2024:3190-1","SUSE-SU-2024:3194-1","SUSE-SU-2024:3195-1","SUSE-SU-2024:3209-1","SUSE-SU-2024:3383-1","SUSE-SU-2024:3483-1","SUSE-SU-2024:4367-1","SUSE-SU-2025:0035-1","SUSE-SU-2025:1027-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:20044-1","SUSE-SU-2025:20047-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42229.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/23e4099bdc3c8381992f9eb975c79196d6755210"},{"type":"WEB","url":"https://git.kernel.org/stable/c/28c8d274848feba552e95c5c2a7e3cfe8f15c534"},{"type":"WEB","url":"https://git.kernel.org/stable/c/71dd428615375e36523f4d4f7685ddd54113646d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/89b9b6fa4463daf820e6a5ef65c3b0c2db239513"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9db8c299a521813630fcb4154298cb60c37f3133"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b502d4a08875ea2b4ea5d5b28dc7c991c8b90cfb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b716e9c3603ee95ed45e938fe47227d22cf3ec35"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f58679996a831754a356974376f248aa0af2eb8e"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42229.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42229"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"06817176784f620984200dc5d7cbe16984f7b262"},{"fixed":"89b9b6fa4463daf820e6a5ef65c3b0c2db239513"},{"fixed":"b716e9c3603ee95ed45e938fe47227d22cf3ec35"},{"fixed":"9db8c299a521813630fcb4154298cb60c37f3133"},{"fixed":"71dd428615375e36523f4d4f7685ddd54113646d"},{"fixed":"28c8d274848feba552e95c5c2a7e3cfe8f15c534"},{"fixed":"b502d4a08875ea2b4ea5d5b28dc7c991c8b90cfb"},{"fixed":"f58679996a831754a356974376f248aa0af2eb8e"},{"fixed":"23e4099bdc3c8381992f9eb975c79196d6755210"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-42229.json"}}],"schema_version":"1.7.5"}