If we allocate a seed on behalf ot the user in crypto_rng_reset,
we must ensure that it is zeroed afterwards or the RNG may be
compromised.
Reported-by: Stephan Mueller <smueller@chronox.de>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
(cherry picked from commit
b617b702da4e922277806f81c411d3051107d462)
Orabug:
27809271
Signed-off-by: John Haxby <john.haxby@oracle.com>
Reviewed-by: HÃ¥kon Bugge <haakon.bugge@oracle.com>
err = tfm->seed(tfm, seed, slen);
- kfree(buf);
+ kzfree(buf);
return err;
}
EXPORT_SYMBOL_GPL(crypto_rng_reset);