lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <5b3eedc2dcd03a8d16a8fbed3f4c2466521e1bdb.camel@linux.ibm.com>
Date:   Tue, 31 Aug 2021 18:58:26 -0400
From:   Mimi Zohar <zohar@...ux.ibm.com>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     linux-integrity <linux-integrity@...r.kernel.org>,
        linux-kernel <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] integrity subsystem updates for v5.15

Hi Linus,
  
The Integrity pull request for v5.15 contains only IMA changes:

- Limit the allowed hash algorithms when writing security.ima xattrs or
verifying them, based on the IMA policy and the configured hash
algorithms.

- Return the calculated "critical data" measurement hash and size to
avoid code duplication.  (Preparatory change for a proposed LSM.)

[Stephen Rothwell addressed a merge conflict between the new device
mapper "critical data" measurements (drivers/md/dm-ima.c) and extending
the "critical data" measurement function.]

- and a single patch to address a compiler warning.

thanks,

Mimi

The following changes since commit 2734d6c1b1a089fb593ef6a23d4b70903526fe0c:

  Linux 5.14-rc2 (2021-07-18 14:13:49 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git tags/integrity-v5.15

for you to fetch changes up to cb181da161963eddc9de0000de6ab2c7942be219:

  IMA: reject unknown hash algorithms in ima_get_hash_algo (2021-08-23 18:22:00 -0400)

----------------------------------------------------------------
integrity-v5.15

----------------------------------------------------------------
Austin Kim (1):
      IMA: remove -Wmissing-prototypes warning

Mimi Zohar (2):
      Merge branch 'ima-buffer-measurement-changes-v4' into next-integrity
      Merge branch 'restrict-digest-alg-v8' into next-integrity

Roberto Sassu (3):
      ima: Introduce ima_get_current_hash_algo()
      ima: Return int in the functions to measure a buffer
      ima: Add digest and digest_len params to the functions to measure a buffer

THOBY Simon (7):
      IMA: remove the dependency on CRYPTO_MD5
      IMA: block writes of the security.ima xattr with unsupported algorithms
      IMA: add support to restrict the hash algorithms used for file appraisal
      IMA: add a policy option to restrict xattr hash algorithms on appraisal
      IMA: introduce a new policy option func=SETXATTR_CHECK
      IMA: prevent SETXATTR_CHECK policy rules with unavailable algorithms
      IMA: reject unknown hash algorithms in ima_get_hash_algo

 Documentation/ABI/testing/ima_policy         |  15 ++-
 include/linux/ima.h                          |  23 +++-
 security/integrity/ima/Kconfig               |   1 -
 security/integrity/ima/ima.h                 |  24 ++--
 security/integrity/ima/ima_api.c             |   6 +-
 security/integrity/ima/ima_appraise.c        |  78 ++++++++++--
 security/integrity/ima/ima_asymmetric_keys.c |   2 +-
 security/integrity/ima/ima_init.c            |   3 +-
 security/integrity/ima/ima_main.c            |  89 ++++++++++----
 security/integrity/ima/ima_mok.c             |   2 +-
 security/integrity/ima/ima_policy.c          | 174 ++++++++++++++++++++++++---
 security/integrity/ima/ima_queue_keys.c      |   2 +-
 security/selinux/ima.c                       |   6 +-
 13 files changed, 350 insertions(+), 75 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ