https://github.com/torvalds/linux
Revision b5c37fe6e24eec194bb29d22fdd55d73bcc709bf authored by Daniel Borkmann on 08 February 2013, 03:04:35 UTC, committed by David S. Miller on 08 February 2013, 19:54:24 UTC
On sctp_endpoint_destroy, previously used sensitive keying material
should be zeroed out before the memory is returned, as we already do
with e.g. auth keys when released.

Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Acked-by: Vlad Yasevich <vyasevic@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
1 parent 6ba542a
History
Tip revision: b5c37fe6e24eec194bb29d22fdd55d73bcc709bf authored by Daniel Borkmann on 08 February 2013, 03:04:35 UTC
net: sctp: sctp_endpoint_free: zero out secret key data
Tip revision: b5c37fe
File Mode Size
new_code.bin.ihex -rw-r--r-- 8.8 KB
new_code_fix.bin.ihex -rw-r--r-- 1.7 KB
trigger_code.bin.ihex -rw-r--r-- 520 bytes
trigger_code_fix.bin.ihex -rw-r--r-- 80 bytes

back to top