lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <a47c4a2bdc27d1a66ae09b9a07a851d6b27e6a5c.camel@linux.ibm.com>
Date:   Mon, 21 Mar 2022 14:37:53 -0400
From:   Mimi Zohar <zohar@...ux.ibm.com>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     linux-integrity <linux-integrity@...r.kernel.org>,
        linux-kernel <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] integrity: subsystem fixes for v5.18

Hi Linus,

Except for extending the "encrypted" key type to support user provided
data, the rest is code cleanup, __setup() usage bug fix, and a trivial
change.

thanks,

Mimi


The following changes since commit 754e0b0e35608ed5206d6a67a791563c631cec07:

  Linux 5.17-rc4 (2022-02-13 12:13:30 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git tags/integrity-v5.18

for you to fetch changes up to 4a48b4c428dc92b5e0b19de83e7eb8d530dddd48:

  MAINTAINERS: add missing security/integrity/platform_certs (2022-02-28 21:08:54 -0500)

----------------------------------------------------------------
integrity-v5.18

----------------------------------------------------------------
Austin Kim (1):
      ima: Fix trivial typos in the comments

Mimi Zohar (4):
      MAINTAINERS: add missing "security/integrity" directory
      ima: rename IMA_ACTION_FLAGS to IMA_NONACTION_FLAGS
      ima: define ima_max_digest_data struct without a flexible array variable
      MAINTAINERS: add missing security/integrity/platform_certs

Randy Dunlap (1):
      EVM: fix the evm= __setup handler return value

Stefan Berger (1):
      ima: Return error code obtained from securityfs functions

Yael Tzur (1):
      KEYS: encrypted: Instantiate key with user-provided decrypted data

 Documentation/security/keys/trusted-encrypted.rst | 25 ++++++--
 MAINTAINERS                                       | 11 ++++
 security/integrity/evm/evm_main.c                 |  2 +-
 security/integrity/ima/ima_api.c                  | 12 ++--
 security/integrity/ima/ima_fs.c                   | 31 +++++++---
 security/integrity/ima/ima_init.c                 |  5 +-
 security/integrity/ima/ima_main.c                 |  9 +--
 security/integrity/ima/ima_policy.c               |  4 +-
 security/integrity/ima/ima_template_lib.c         |  7 +--
 security/integrity/integrity.h                    | 14 ++++-
 security/keys/Kconfig                             | 19 ++++--
 security/keys/encrypted-keys/encrypted.c          | 71 +++++++++++++++++------
 12 files changed, 146 insertions(+), 64 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ