diff options
author | David Gstir <[email protected]> | 2024-07-03 14:49:58 +0200 |
---|---|---|
committer | Herbert Xu <[email protected]> | 2024-07-13 11:50:28 +1200 |
commit | dd52b5eeb0f70893f762da7254e923fd23fd1379 (patch) | |
tree | a9e1f5bf9fefdfe1325d8f277aa4e5cf1a8d386f /lib/memory-notifier-error-inject.c | |
parent | addea5858b66a185d33bf1b90980316f5f375d75 (diff) |
crypto: mxs-dcp - Ensure payload is zero when using key slot
We could leak stack memory through the payload field when running
AES with a key from one of the hardware's key slots. Fix this by
ensuring the payload field is set to 0 in such cases.
This does not affect the common use case when the key is supplied
from main memory via the descriptor payload.
Signed-off-by: David Gstir <[email protected]>
Reported-by: kernel test robot <[email protected]>
Reported-by: Dan Carpenter <[email protected]>
Closes: https://lore.kernel.org/r/[email protected]/
Fixes: 3d16af0b4cfa ("crypto: mxs-dcp: Add support for hardware-bound keys")
Signed-off-by: Herbert Xu <[email protected]>
Diffstat (limited to 'lib/memory-notifier-error-inject.c')
0 files changed, 0 insertions, 0 deletions