lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 14 Jul 2022 11:58:22 -0400
From:   Mimi Zohar <zohar@...ux.ibm.com>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     linux-integrity <linux-integrity@...r.kernel.org>,
        linux-kernel <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] integrity: subsystem fixes for v5.19

Hi Linus,

Here are a number of fixes for recently found bugs.  Only "ima: fix
violation measurement list record" was introduced in the current
release.  The rest address existing bugs.

thanks,

Mimi

The following changes since commit b13baccc3850ca8b8cccbf8ed9912dbaa0fdf7f3:

  Linux 5.19-rc2 (2022-06-12 16:11:37 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git tags/integrity-v5.19-fix

for you to fetch changes up to 067d2521874135267e681c19d42761c601d503d6:

  ima: Fix potential memory leak in ima_init_crypto() (2022-07-13 10:13:58 -0400)

----------------------------------------------------------------
integrity-v5.19-fix

----------------------------------------------------------------
Coiby Xu (1):
      ima: force signature verification when CONFIG_KEXEC_SIG is configured

Huaxin Lu (1):
      ima: Fix a potential integer overflow in ima_appraise_measurement

Jianglei Nie (1):
      ima: Fix potential memory leak in ima_init_crypto()

Mimi Zohar (1):
      ima: fix violation measurement list record

Xiu Jianfeng (1):
      Revert "evm: Fix memleak in init_desc"

 include/linux/kexec.h                     |  6 ++++++
 kernel/kexec_file.c                       | 11 ++++++++++-
 security/integrity/evm/evm_crypto.c       |  7 ++-----
 security/integrity/ima/ima_appraise.c     |  3 ++-
 security/integrity/ima/ima_crypto.c       |  1 +
 security/integrity/ima/ima_efi.c          |  2 ++
 security/integrity/ima/ima_template_lib.c |  6 +++---
 7 files changed, 26 insertions(+), 10 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ