[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20181116161957.GG1706@sasha-vm>
Date: Fri, 16 Nov 2018 11:19:57 -0500
From: Sasha Levin <sashal@...nel.org>
To: Jarkko Sakkinen <jarkko.sakkinen@...ux.intel.com>
Cc: linux-integrity@...r.kernel.org,
linux-security-module@...r.kernel.org,
James Bottomley <James.Bottomley@...senPartnership.com>,
Tomas Winkler <tomas.winkler@...el.com>,
Tadeusz Struk <tadeusz.struk@...el.com>,
Stefan Berger <stefanb@...ux.vnet.ibm.com>,
Nayna Jain <nayna@...ux.ibm.com>, stable@...r.kernel.org,
Peter Huewe <peterhuewe@....de>,
Jason Gunthorpe <jgg@...pe.ca>, Arnd Bergmann <arnd@...db.de>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
open list <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH v8 08/17] tpm: call tpm2_flush_space() on error in
tpm_try_transmit()
On Fri, Nov 16, 2018 at 02:38:32PM +0200, Jarkko Sakkinen wrote:
>Always call tpm2_flush_space() on failure in tpm_try_transmit() so that
>the volatile memory of the TPM gets cleared. If /dev/tpm0 does not have
>sufficient permissions (usually it has), this could lead to the leakage
>of TPM objects. Through /dev/tpmrm0 this issue does not raise any new
>security concerns.
>
>Cc: James Bottomley <James.Bottomley@...senPartnership.com>
>Cc: stable@...r.kernel.org
>Fixes: 745b361e989a ("tpm:tpm: infrastructure for TPM spaces")
>Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@...ux.intel.com>
>Reviewed-by: Stefan Berger <stefanb@...ux.ibm.com>
Hi Jarkko,
This patch seems to depend on previous patches in this series, but those
were not tagged for stable. Do they also need to be backported? If so,
can you tag them as such?
--
Thanks,
Sasha
Powered by blists - more mailing lists