https://github.com/torvalds/linux
Revision b5c37fe6e24eec194bb29d22fdd55d73bcc709bf authored by Daniel Borkmann on 08 February 2013, 03:04:35 UTC, committed by David S. Miller on 08 February 2013, 19:54:24 UTC
On sctp_endpoint_destroy, previously used sensitive keying material
should be zeroed out before the memory is returned, as we already do
with e.g. auth keys when released.

Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Acked-by: Vlad Yasevich <vyasevic@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
1 parent 6ba542a
History
Tip revision: b5c37fe6e24eec194bb29d22fdd55d73bcc709bf authored by Daniel Borkmann on 08 February 2013, 03:04:35 UTC
net: sctp: sctp_endpoint_free: zero out secret key data
Tip revision: b5c37fe
File Mode Size
mpr.HEX -rw-r--r-- 9.7 KB
usa18x.HEX -rw-r--r-- 15.3 KB
usa19.HEX -rw-r--r-- 9.7 KB
usa19qi.HEX -rw-r--r-- 9.7 KB
usa19qw.HEX -rw-r--r-- 15.3 KB
usa19w.HEX -rw-r--r-- 15.3 KB
usa28.HEX -rw-r--r-- 15.8 KB
usa28x.HEX -rw-r--r-- 15.3 KB
usa28xa.HEX -rw-r--r-- 15.3 KB
usa28xb.HEX -rw-r--r-- 15.3 KB
usa49w.HEX -rw-r--r-- 15.9 KB
usa49wlc.HEX -rw-r--r-- 16.0 KB

back to top