Bug 2223719
Summary: | Temporary values used for the FIPS integrity test should be zeroized after use | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 9 | Reporter: | Clemens Lang <cllang> | ||||
Component: | kernel | Assignee: | Vladis Dronov <vdronov> | ||||
kernel sub component: | Crypto | QA Contact: | Ondrej Moriš <omoris> | ||||
Status: | CLOSED ERRATA | Docs Contact: | |||||
Severity: | high | ||||||
Priority: | high | CC: | herbert.xu, omoris, vdronov | ||||
Version: | 9.2 | Keywords: | Triaged, ZStream | ||||
Target Milestone: | rc | ||||||
Target Release: | 9.3 | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | kernel-5.14.0-353.el9 | Doc Type: | If docs needed, set a value | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | |||||||
: | 2227768 (view as bug list) | Environment: | |||||
Last Closed: | 2023-11-07 08:49:49 UTC | Type: | Bug | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | |||||||
Bug Blocks: | 2227768 | ||||||
Attachments: |
|
Description
Clemens Lang
2023-07-18 15:41:07 UTC
Created attachment 1976367 [details]
Proposed patch
Clemens, could you please submit this patch upstream? It looks good enough as it stands. Thanks! It'll be a while before I can get to doing that, since I've never sent a patch upstream for the kernel, and I don't have a lot of spare cycles at the moment. (In reply to Herbert Xu from comment #2) > Clemens, could you please submit this patch upstream? It looks good enough as it stands. Thanks! I'll handle this (upstream submission and a RHEL work), thanks Clemens for the patch, thanks Herbert for a review. Thanks Vladis. As you noted, it seems that this patch is already queued up upstream so we simply need to wait: https://patchwork.kernel.org/project/linux-crypto/patch/20230717125509.105015-1-mngyadam@amazon.com/ Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Important: kernel security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2023:6583 |