WSL2-Linux-Kernel/drivers/char/tpm
Peter Huewe 3321c07ae5 TPM: Zero buffer after copying to userspace
Since the buffer might contain security related data it might be a good idea to
zero the buffer after we have copied it to userspace.

This got assigned CVE-2011-1162.

Signed-off-by: Rajiv Andrade <srajiv@linux.vnet.ibm.com>
Cc: Stable Kernel <stable@kernel.org>
Signed-off-by: James Morris <jmorris@namei.org>
2011-09-23 09:46:41 +10:00
..
Kconfig TPM: TCG_ATMEL should depend on HAS_IOPORT 2011-09-23 09:45:57 +10:00
Makefile [PATCH] tpm: driver for next generation TPM chips 2006-04-22 09:19:54 -07:00
tpm.c TPM: Zero buffer after copying to userspace 2011-09-23 09:46:41 +10:00
tpm.h tpm_tis: Fix the probing for interrupts 2011-07-12 18:53:08 -03:00
tpm_atmel.c platform driver: fix incorrect use of 'platform_bus_type' with 'struct device_driver' 2009-03-24 16:38:25 -07:00
tpm_atmel.h tpmdd maintainers 2007-08-22 19:52:44 -07:00
tpm_bios.c include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h 2010-03-30 22:02:32 +09:00
tpm_infineon.c Update broken web addresses in the kernel. 2010-10-18 11:03:14 +02:00
tpm_nsc.c TPM: tpm_nsc: Fix a double free of pdev in cleanup_nsc 2011-09-23 09:46:17 +10:00
tpm_tis.c tpm_tis: fix build when ACPI is not enabled 2011-08-03 14:25:21 -10:00