lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 2 Nov 2017 21:21:00 +1100 (AEDT) From: James Morris <james.l.morris@...cle.com> To: Linus Torvalds <torvalds@...ux-foundation.org> cc: linux-kernel@...r.kernel.org, David Howells <dhowells@...hat.com>, keyrings@...r.kernel.org, linux-security-module@...r.kernel.org Subject: [GIT PULL] Keys fixes for v4.15 Hi Linus, Please pull these fixes for the Keys subsystem by Eric Biggers. The following changes since commit 3a99df9a3d14cd866b5516f8cba515a3bfd554ab: Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespace (2017-11-01 16:04:27 -0700) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git fixes-v4.14-rc7 Eric Biggers (3): KEYS: return full count in keyring_read() if buffer is too small KEYS: trusted: fix writing past end of buffer in trusted_read() KEYS: fix out-of-bounds read during ASN.1 parsing lib/asn1_decoder.c | 3 +++ security/keys/keyring.c | 39 +++++++++++++++++++-------------------- security/keys/trusted.c | 23 ++++++++++++----------- 3 files changed, 34 insertions(+), 31 deletions(-)
Powered by blists - more mailing lists