lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1559318325.4280.13.camel@linux.ibm.com>
Date:   Fri, 31 May 2019 11:58:45 -0400
From:   Mimi Zohar <zohar@...ux.ibm.com>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     linux-kernel@...r.kernel.org,
        linux-security-module <linux-security-module@...r.kernel.org>,
        linux-integrity <linux-integrity@...r.kernel.org>
Subject: [GIT PULL] integrity subsystem fixes for v5.2

Hi Linus,

Included in this pull request are four bug fixes, which are not
specific to 5.2.  The first two are related to the architecture
specific IMA policy support.  The other two patches, one is related to
EVM signatures, based on additional hash algorithms, and the other is
related to displaying the IMA policy.
 
At least Scott's patch should have been included in the last open
window, but I sent the v5.2 pull request a bit earlier than normal.

thanks,

Mimi

The following changes since commit a188339ca5a396acc588e5851ed7e19f66b0ebd9:

  Linux 5.2-rc1 (2019-05-19 15:47:09 -0700)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git next-fixes-for-5.2-rc

for you to fetch changes up to 8cdc23a3d9ec0944000ad43bad588e36afdc38cd:

  ima: show rules with IMA_INMASK correctly (2019-05-29 23:18:25 -0400)

----------------------------------------------------------------
Petr Vorel (1):
      ima: fix wrong signed policy requirement when not appraising

Roberto Sassu (2):
      evm: check hash algorithm passed to init_desc()
      ima: show rules with IMA_INMASK correctly

Scott Wood (1):
      x86/ima: Check EFI_RUNTIME_SERVICES before using

 arch/x86/kernel/ima_arch.c          |  5 +++++
 security/integrity/evm/evm_crypto.c |  3 +++
 security/integrity/ima/ima_policy.c | 28 ++++++++++++++++------------
 3 files changed, 24 insertions(+), 12 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ