mirror of
http://cgit.git.savannah.gnu.org/git/grub.git
synced 2026-04-28 06:33:17 +00:00
disk/cryptodisk: Wipe the passphrase from memory
Switching to another EFI boot application while there are secrets in RAM is dangerous, because not all firmware is wiping memory on free. To reduce the attack surface, wipe the passphrase acquired when unlocking an encrypted volume. Signed-off-by: Maxim Suhanov <dfirblog@gmail.com> Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
This commit is contained in:
committed by
Daniel Kiper
parent
301b4ef25a
commit
dbc0eb5bd1
@@ -1302,6 +1302,7 @@ grub_cryptodisk_scan_device_real (const char *name,
|
||||
|
||||
if (askpass)
|
||||
{
|
||||
grub_memset (cargs->key_data, 0, cargs->key_len);
|
||||
cargs->key_len = 0;
|
||||
grub_free (cargs->key_data);
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user