commit | 57070c850a03ee0cea654fc22cb8032fc3139d39 | [log] [tgz] |
---|---|---|
author | Eric Biggers <ebiggers@google.com> | Thu Jun 08 14:48:57 2017 +0100 |
committer | James Morris <james.l.morris@oracle.com> | Fri Jun 09 13:29:48 2017 +1000 |
tree | be043744d16a49c9b33fc17f6d1d6f2a6ee89102 | |
parent | 63a0b0509e700717a59f049ec6e4e04e903c7fe2 [diff] |
KEYS: sanitize add_key() and keyctl() key payloads Before returning from add_key() or one of the keyctl() commands that takes in a key payload, zero the temporary buffer that was allocated to hold the key payload copied from userspace. This may contain sensitive key material that should not be kept around in the slab caches. Signed-off-by: Eric Biggers <ebiggers@google.com> Signed-off-by: David Howells <dhowells@redhat.com> Signed-off-by: James Morris <james.l.morris@oracle.com>