lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 27 Jun 2023 08:01:44 -0700
From:   Casey Schaufler <casey@...aufler-ca.com>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     LSM List <linux-security-module@...r.kernel.org>,
        Linux kernel mailing list <linux-kernel@...r.kernel.org>,
        Casey Schaufler <casey@...aufler-ca.com>
Subject: [GIT PULL] Smack patches for 6.5

Hello Linus,

Here is the Smack pull request for v6.5.

There are two patches, both of which change how Smack initializes
the SMACK64TRANSMUTE extended attribute. The first corrects the
behavior of overlayfs, which creates inodes differently from other
filesystems. The second ensures that transmute attributes specified
by mount options are correctly assigned. These updates have been in
the next branch and pass all tests. Thank you.

The following changes since commit ac9a78681b921877518763ba0e89202254349d1b:

  Linux 6.4-rc1 (2023-05-07 13:34:35 -0700)

are available in the Git repository at:

  https://github.com/cschaufler/smack-next tags/Smack-for-6.5

for you to fetch changes up to 2c085f3a8f23c9b444e8b99d93c15d7ce870fc4e:

  smack: Record transmuting in smk_transmuted (2023-05-11 10:05:39 -0700)

----------------------------------------------------------------
Two patches that improve inode attribute initialization.

----------------------------------------------------------------
Roberto Sassu (2):
      smack: Retrieve transmuting information in smack_inode_getsecurity()
      smack: Record transmuting in smk_transmuted

 security/smack/smack.h     |  1 +
 security/smack/smack_lsm.c | 63 ++++++++++++++++++++++++++++++++++------------
 2 files changed, 48 insertions(+), 16 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ