lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <alpine.LRH.2.02.1203211312440.3364@tundra.namei.org>
Date:	Wed, 21 Mar 2012 13:23:05 +1100 (EST)
From:	James Morris <jmorris@...ei.org>
To:	Linus Torvalds <torvalds@...ux-foundation.org>
cc:	linux-security-module@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [GIT] Security subsystem updates for 3.4

The main addition here is the new Yama security module from Kees Cook, 
which was discussed at the Linux Security Summit last year.  Its purpose 
is to collect miscellaneous DAC security enhancements in one place.  This 
also marks a departure in policy for LSM modules, which were previously 
limited to being standalone access control systems.  Chromium OS is using 
Yama, and I believe there are plans for Ubuntu, at least.

This patchset also includes maintenance updates for AppArmor, TOMOYO and 
others.

Please pull.

--- 

The following changes since commit c16fa4f2ad19908a47c63d8fa436a1178438c7e7:
  Linus Torvalds (1):
        Linux 3.3

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git next

Al Viro (2):
      mm: collapse security_vm_enough_memory() variants into a single function
      security: trim security.h

Dan Carpenter (1):
      KEYS: testing wrong bit for KEY_FLAG_REVOKED

David Howells (1):
      KEYS: Allow special keyrings to be cleared

Dmitry Kasatkin (2):
      ima: policy for RAMFS
      digsig: changed type of the timestamp

Eric Paris (1):
      IMA: fix audit res field to indicate 1 for success and 0 for failure

Fabio Estevam (1):
      ima: fix Kconfig dependencies

James Morris (4):
      Merge branch 'linus-master'; commit 'v3.3-rc3' into next
      Merge branch 'next-queue' into next
      Merge branch 'for-security' of git://git.kernel.org/.../jj/linux-apparmor into next
      Merge branch 'for-security' of git://git.kernel.org/.../jj/linux-apparmor into next

Jan Engelhardt (1):
      AppArmor: add const qualifiers to string arrays

John Johansen (13):
      AppArmor: Add mising end of structure test to caps unpacking
      AppArmor: Fix dropping of allowed operations that are force audited
      AppArmor: Fix underflow in xindex calculation
      AppArmor: fix mapping of META_READ to audit and quiet flags
      AppArmor: Fix the error case for chroot relative path name lookup
      AppArmor: Fix error returned when a path lookup is disconnected
      AppArmor: Fix oops in policy unpack auditing
      AppArmor: Add const qualifiers to generated string tables
      AppArmor: Retrieve the dentry_path for error reporting when path lookup fails
      AppArmor: Minor cleanup of d_namespace_path to consolidate error handling
      AppArmor: Update dfa matching routines.
      AppArmor: Move path failure information into aa_get_name and rename
      AppArmor: Add ability to load extended policy

Kees Cook (7):
      security: create task_free security callback
      security: Yama LSM
      Yama: add PR_SET_PTRACER_ANY
      AppArmor: refactor securityfs to use structures
      AppArmor: add initial "features" directory to securityfs
      AppArmor: add "file" details to securityfs
      AppArmor: export known rlimit names/value mappings in securityfs

Randy Dunlap (1):
      security: fix ima kconfig warning

Stefan Berger (2):
      tpm_tis: Only probe iTPMs
      tpm_tis: Clean up after module_param cleanup

Tetsuo Handa (4):
      TOMOYO: Fix mount flags checking order.
      TOMOYO: Return appropriate value to poll().
      TOMOYO: Return error if fails to delete a domain
      AppArmor: Fix location of const qualifier on generated string tables

Tim Gardner (1):
      TPM: Zero buffer whole after copying to userspace

 Documentation/networking/dns_resolver.txt |    4 +
 Documentation/security/00-INDEX           |    2 +
 Documentation/security/Yama.txt           |   65 ++++++
 Documentation/security/keys.txt           |    4 +
 drivers/char/tpm/Kconfig                  |    1 -
 drivers/char/tpm/tpm.c                    |    3 +-
 drivers/char/tpm/tpm.h                    |    2 +
 drivers/char/tpm/tpm_tis.c                |   17 +-
 drivers/net/macvtap.c                     |    1 +
 drivers/target/iscsi/iscsi_target.c       |    1 +
 drivers/target/iscsi/iscsi_target_login.c |    1 +
 fs/cifs/cifsacl.c                         |    1 +
 fs/nfs/client.c                           |    1 +
 fs/nfs/idmap.c                            |    1 +
 fs/proc/proc_sysctl.c                     |    2 +
 fs/quota/dquot.c                          |    1 +
 fs/super.c                                |    1 +
 include/linux/digsig.h                    |    4 +-
 include/linux/key.h                       |    1 +
 include/linux/prctl.h                     |    7 +
 include/linux/security.h                  |   80 ++++----
 include/net/sock.h                        |    2 +
 ipc/msgutil.c                             |    2 +
 kernel/cred.c                             |    1 +
 kernel/exit.c                             |    1 +
 kernel/fork.c                             |    3 +-
 kernel/sched/core.c                       |    1 +
 kernel/sysctl.c                           |    1 +
 mm/mmap.c                                 |   17 ++-
 mm/mprotect.c                             |    2 +-
 mm/mremap.c                               |    2 +-
 mm/shmem.c                                |    4 +-
 mm/swapfile.c                             |    4 +-
 net/dns_resolver/dns_key.c                |    1 +
 security/Kconfig                          |    6 +
 security/Makefile                         |    2 +
 security/apparmor/Makefile                |   27 ++-
 security/apparmor/apparmorfs.c            |  195 ++++++++++++++----
 security/apparmor/audit.c                 |    7 +-
 security/apparmor/domain.c                |    5 +-
 security/apparmor/file.c                  |   21 +--
 security/apparmor/include/apparmor.h      |   15 ++-
 security/apparmor/include/apparmorfs.h    |   44 ++++
 security/apparmor/include/audit.h         |    9 +-
 security/apparmor/include/file.h          |    2 +-
 security/apparmor/include/match.h         |    3 +
 security/apparmor/include/path.h          |    3 +-
 security/apparmor/include/policy.h        |   15 ++-
 security/apparmor/include/resource.h      |    4 +
 security/apparmor/match.c                 |   80 +++++++-
 security/apparmor/path.c                  |   56 +++--
 security/apparmor/policy.c                |    3 +-
 security/apparmor/policy_unpack.c         |   31 +++-
 security/apparmor/resource.c              |    5 +
 security/capability.c                     |    5 +
 security/commoncap.c                      |    1 +
 security/integrity/ima/Kconfig            |    4 +-
 security/integrity/ima/ima_audit.c        |    2 +-
 security/integrity/ima/ima_policy.c       |    3 +-
 security/keys/keyctl.c                    |   15 ++-
 security/keys/process_keys.c              |    3 +-
 security/security.c                       |   21 +--
 security/selinux/hooks.c                  |    2 +
 security/smack/smack_lsm.c                |    3 +
 security/tomoyo/audit.c                   |    4 +-
 security/tomoyo/common.c                  |   63 ++----
 security/tomoyo/common.h                  |    6 +-
 security/tomoyo/mount.c                   |   38 ++--
 security/tomoyo/securityfs_if.c           |    5 +-
 security/yama/Kconfig                     |   13 ++
 security/yama/Makefile                    |    3 +
 security/yama/yama_lsm.c                  |  323 +++++++++++++++++++++++++++++
 72 files changed, 1036 insertions(+), 252 deletions(-)
 create mode 100644 Documentation/security/Yama.txt
 create mode 100644 security/yama/Kconfig
 create mode 100644 security/yama/Makefile
 create mode 100644 security/yama/yama_lsm.c
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ