lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 5 Dec 2022 16:30:24 -0800
From:   Kees Cook <keescook@...omium.org>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     linux-kernel@...r.kernel.org, Ayushman Dutta <ayudutta@...zon.com>,
        Christian Brauner <brauner@...nel.org>,
        Gautam Menghani <gautammenghani201@...il.com>,
        Kees Cook <keescook@...omium.org>,
        Kuniyuki Iwashima <kuniyu@...zon.com>,
        Randy Dunlap <rdunlap@...radead.org>,
        syzbot+ab17848fe269b573eb71@...kaller.appspotmail.com
Subject: [GIT PULL] seccomp updates for v6.2-rc1

Hi Linus,

Please pull these 3 seccomp updates for v6.2-rc1.

Thanks!

-Kees

The following changes since commit 247f34f7b80357943234f93f247a1ae6b6c3a740:

  Linux 6.1-rc2 (2022-10-23 15:27:33 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/seccomp-v6.2-rc1

for you to fetch changes up to b9069728a70c23dad00684eb994a3f5295f127cf:

  seccomp: document the "filter_count" field (2022-12-02 11:33:48 -0800)

----------------------------------------------------------------
seccomp updates for v6.2-rc1

- Add missing kerndoc parameter (Randy Dunlap).

- Improve seccomp selftest to check CAP_SYS_ADMIN (Gautam Menghani).

- Fix allocation leak when cloned thread immediately dies (Kuniyuki Iwashima).

----------------------------------------------------------------
Gautam Menghani (1):
      selftests/seccomp: Check CAP_SYS_ADMIN capability in the test mode_filter_without_nnp

Kuniyuki Iwashima (1):
      seccomp: Move copy_seccomp() to no failure path.

Randy Dunlap (1):
      seccomp: document the "filter_count" field

 include/linux/seccomp.h                       |  1 +
 kernel/fork.c                                 | 17 +++++++++++------
 tools/testing/selftests/seccomp/seccomp_bpf.c |  6 ++++--
 3 files changed, 16 insertions(+), 8 deletions(-)

-- 
Kees Cook

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ