crypto: keywrap - memzero the correct memory
commit2b8b28fd23upstream. We're clearing the wrong memory. The memory corruption is likely harmless because we weren't going to use that stack memory again but not zeroing is a potential information leak. Fixes:e28facde3c('crypto: keywrap - add key wrapping block chaining mode') Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Acked-by: Stephan Mueller <smueller@chronox.de> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
This commit is contained in:
committed by
Greg Kroah-Hartman
parent
0cdc91f539
commit
f69c1b51f6
@@ -212,7 +212,7 @@ static int crypto_kw_decrypt(struct blkcipher_desc *desc,
|
|||||||
SEMIBSIZE))
|
SEMIBSIZE))
|
||||||
ret = -EBADMSG;
|
ret = -EBADMSG;
|
||||||
|
|
||||||
memzero_explicit(&block, sizeof(struct crypto_kw_block));
|
memzero_explicit(block, sizeof(struct crypto_kw_block));
|
||||||
|
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
@@ -297,7 +297,7 @@ static int crypto_kw_encrypt(struct blkcipher_desc *desc,
|
|||||||
/* establish the IV for the caller to pick up */
|
/* establish the IV for the caller to pick up */
|
||||||
memcpy(desc->info, block->A, SEMIBSIZE);
|
memcpy(desc->info, block->A, SEMIBSIZE);
|
||||||
|
|
||||||
memzero_explicit(&block, sizeof(struct crypto_kw_block));
|
memzero_explicit(block, sizeof(struct crypto_kw_block));
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user