lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 02 Nov 2021 06:41:09 -0400
From:   Mimi Zohar <zohar@...ux.ibm.com>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     linux-integrity <linux-integrity@...r.kernel.org>,
        linux-kernel <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] integrity subsystem updates for v5.16

Hi Linus,

Other than the new gid IMA policy rule support and the RCU locking fix,
the couple of remaining changes are minor/trivial (e.g.
__ro_after_init, replacing strscpy).

thanks,

Mimi

The following changes since commit 6880fa6c56601bb8ed59df6c30fd390cc5f6dd8f:

  Linux 5.15-rc1 (2021-09-12 16:28:37 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git tags/integrity-v5.16

for you to fetch changes up to 32ba540f3c2a7ef61ed5a577ce25069a3d714fc9:

  evm: mark evm_fixmode as __ro_after_init (2021-10-28 18:52:49 -0400)

----------------------------------------------------------------
integrity-v5.16

----------------------------------------------------------------
Alex Henrie (1):
      ima: fix uid code style problems

Austin Kim (1):
      evm: mark evm_fixmode as __ro_after_init

Curtis Veit (1):
      ima: add gid support

Petr Vorel (2):
      ima_policy: Remove duplicate 'the' in docs comment
      ima: Use strscpy instead of strlcpy

liqiong (1):
      ima: fix deadlock when traversing "ima_default_rules".

 Documentation/ABI/testing/ima_policy |   8 +-
 security/integrity/evm/evm_main.c    |   2 +-
 security/integrity/ima/ima_api.c     |   2 +-
 security/integrity/ima/ima_policy.c  | 243 ++++++++++++++++++++++++++++-------
 4 files changed, 208 insertions(+), 47 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ