lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAHC9VhQc7GguPxuN0cU2D0960LBcDK6fW1fHWyMkQCyxNZ_9FA@mail.gmail.com>
Date:   Mon, 26 Apr 2021 19:27:42 -0400
From:   Paul Moore <paul@...l-moore.com>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     linux-kernel@...r.kernel.org, selinux@...r.kernel.org,
        linux-security-module@...r.kernel.org
Subject: [GIT PULL] SELinux patches for v5.13

Hi Linus,

Here is the SELinux pull request for v5.13, the highlights are below:

* Add support for measuring the SELinux state and policy capabilities using IMA.

* A handful of SELinux/NFS patches to compare the SELinux state of one
mount with a set of mount options.  Olga goes into more detail in the
patch descriptions, but this is important as it allows more
flexibility when using NFS and SELinux context mounts.

* Properly differentiate between the subjective and objective LSM
credentials; including support for the SELinux and Smack.  My clumsy
attempt at a proper fix for AppArmor didn't quite pass muster so John
is working on a proper AppArmor patch, in the meantime this set of
patches shouldn't change the behavior of AppArmor in any way.  This
change explains the bulk of the diffstate beyond security/.

* Fix a problem where we were not properly terminating the permission
list for two SELinux object classes.

Everything has been tested against the selinux-testsuite and as of a
few moments ago the tag applies cleanly to your tree; please merge
this for v5.13.

Thanks,
-Paul

--
The following changes since commit a38fd8748464831584a19438cbb3082b5a2dab15:

 Linux 5.12-rc2 (2021-03-05 17:33:41 -0800)

are available in the Git repository at:

 git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux.git
   tags/selinux-pr-20210426

for you to fetch changes up to e4c82eafb609c2badc56f4e11bc50fcf44b8e9eb:

 selinux: add proper NULL termination to the secclass_map permissions
   (2021-04-21 21:43:25 -0400)

----------------------------------------------------------------
selinux/stable-5.13 PR 20210426

----------------------------------------------------------------
Lakshmi Ramasubramanian (1):
     selinux: measure state and policy capabilities

Olga Kornievskaia (3):
     lsm,selinux: add new hook to compare new mount to an existing mount
     nfs: remove unneeded null check in nfs_fill_super()
     nfs: account for selinux security context when deciding to share
          superblock

Paul Moore (4):
     lsm: separate security_task_getsecid() into subjective and objective
          variants
     selinux: clarify task subjective and objective credentials
     smack: differentiate between subjective and objective task credentials
     selinux: add proper NULL termination to the secclass_map permissions

Vivek Goyal (1):
     selinux: Allow context mounts for unpriviliged overlayfs

Xiong Zhenwu (2):
     selinux: fix misspellings using codespell tool
     selinux: fix misspellings using codespell tool

drivers/android/binder.c              |  11 ++-
fs/nfs/fs_context.c                   |   3 +
fs/nfs/internal.h                     |   1 +
fs/nfs/super.c                        |   6 +-
include/linux/cred.h                  |   2 +-
include/linux/lsm_hook_defs.h         |   6 +-
include/linux/lsm_hooks.h             |  18 +++-
include/linux/nfs_fs_sb.h             |   1 +
include/linux/security.h              |  18 +++-
kernel/audit.c                        |   4 +-
kernel/auditfilter.c                  |   3 +-
kernel/auditsc.c                      |   8 +-
kernel/bpf/bpf_lsm.c                  |   3 +-
net/netlabel/netlabel_unlabeled.c     |   2 +-
net/netlabel/netlabel_user.h          |   2 +-
security/apparmor/lsm.c               |   3 +-
security/integrity/ima/ima_appraise.c |   2 +-
security/integrity/ima/ima_main.c     |  14 +--
security/security.c                   |  20 +++-
security/selinux/hooks.c              | 170 ++++++++++++++++++++++++------
security/selinux/ima.c                |  87 +++++++++++++++-
security/selinux/include/classmap.h   |   5 +-
security/selinux/include/ima.h        |   6 ++
security/selinux/include/security.h   |   2 +-
security/selinux/selinuxfs.c          |   6 ++
security/selinux/ss/hashtab.c         |   2 +-
security/selinux/ss/services.c        |   2 +-
security/smack/smack.h                |  18 +++-
security/smack/smack_lsm.c            |  39 +++++---
29 files changed, 372 insertions(+), 92 deletions(-)

-- 
paul moore
www.paul-moore.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ