VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Driver
diff options
context:
space:
mode:
authorMounir IDRASSI <mounir.idrassi@idrix.fr>2014-08-26 00:02:17 +0200
committerMounir IDRASSI <mounir.idrassi@idrix.fr>2014-11-08 23:22:57 +0100
commit5fcb262539e0d098e145722566b8ffc048170e6d (patch)
tree2647a8f0b30b088b8d5dd2f8dbaf0f874b13fce3 /src/Driver
parentd6aa6536482efa719a44a757ea2622cad86f1e23 (diff)
downloadVeraCrypt-5fcb262539e0d098e145722566b8ffc048170e6d.tar.gz
VeraCrypt-5fcb262539e0d098e145722566b8ffc048170e6d.zip
Windows vulnerability fix : clear sensitive data in Windows kernel driver by using burjn instead of memset
Diffstat (limited to 'src/Driver')
-rw-r--r--src/Driver/DriveFilter.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/Driver/DriveFilter.c b/src/Driver/DriveFilter.c
index 6fc6d674..331b3720 100644
--- a/src/Driver/DriveFilter.c
+++ b/src/Driver/DriveFilter.c
@@ -323,7 +323,7 @@ static NTSTATUS MountDrive (DriveFilterExtension *Extension, Password *password,
if (mappedCryptoInfo)
{
Dump ("Wiping memory %x %d\n", cryptoInfoAddress.LowPart, BootArgs.CryptoInfoLength);
- memset (mappedCryptoInfo, 0, BootArgs.CryptoInfoLength);
+ burn (mappedCryptoInfo, BootArgs.CryptoInfoLength);
MmUnmapIoSpace (mappedCryptoInfo, BootArgs.CryptoInfoLength);
}
}