lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <bdea3a9112c28fd6c2c158a14b632f89dba53ac6.camel@linux.ibm.com>
Date:   Tue, 27 Jun 2023 08:28:06 -0400
From:   Mimi Zohar <zohar@...ux.ibm.com>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     linux-integrity <linux-integrity@...r.kernel.org>,
        linux-kernel <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] integrity: susbystem updates for v6.5

Hi Linus,

Contains an i_version change, one bug fix, and three kernel doc fixes:

- Instead of IMA detecting file change by directly accesssing
i_version, it now calls vfs_getattr_nosec().

- The bug fix addresses a race condition when inserting a new node in
the iint rb-tree.

thanks,

Mimi

The following changes since commit f1fcbaa18b28dec10281551dfe6ed3a3ed80e3d6:

  Linux 6.4-rc2 (2023-05-14 12:51:40 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git tags/integrity-v6.5

for you to fetch changes up to 95526d13038c2bbddd567a4d8e39fac42484e182:

  ima: Fix build warnings (2023-06-06 09:37:23 -0400)

----------------------------------------------------------------
integrity-v6.5

----------------------------------------------------------------
Jeff Layton (1):
      IMA: use vfs_getattr_nosec to get the i_version

Roberto Sassu (3):
      evm: Complete description of evm_inode_setattr()
      evm: Fix build warnings
      ima: Fix build warnings

Tianjia Zhang (1):
      integrity: Fix possible multiple allocation in integrity_inode_get()

 security/integrity/evm/evm_crypto.c |  2 +-
 security/integrity/evm/evm_main.c   |  4 +++-
 security/integrity/iint.c           | 15 +++++++++------
 security/integrity/ima/ima_api.c    |  9 ++++++---
 security/integrity/ima/ima_main.c   | 12 ++++++++----
 security/integrity/ima/ima_modsig.c |  3 +++
 security/integrity/ima/ima_policy.c |  3 ++-
 7 files changed, 32 insertions(+), 16 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ