lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <202407150921.BD2B798C6A@keescook>
Date: Mon, 15 Jul 2024 09:21:11 -0700
From: Kees Cook <kees@...nel.org>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: linux-kernel@...r.kernel.org, Alexey Dobriyan <adobriyan@...il.com>,
	"H.J. Lu" <hjl.tools@...il.com>, Kees Cook <kees@...nel.org>
Subject: [GIT PULL] execve updates for v6.11-rc1

Hi Linus,

Please pull these execve updates for v6.11-rc1.

Thanks!

-Kees

The following changes since commit c3f38fa61af77b49866b006939479069cd451173:

  Linux 6.10-rc2 (2024-06-02 15:44:56 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git tags/execve-v6.11-rc1

for you to fetch changes up to 21f93108306026b8066db31c24a097192c8c36c7:

  exec: Avoid pathological argc, envc, and bprm->p values (2024-07-13 21:31:58 -0700)

----------------------------------------------------------------
execve updates for v6.11-rc1

- Use value of kernel.randomize_va_space once per exec (Alexey Dobriyan)

- Honor PT_LOAD alignment for static PIE

- Make bprm->argmin only visible under CONFIG_MMU

- Add KUnit testing of bprm_stack_limits()

----------------------------------------------------------------
Alexey Dobriyan (1):
      ELF: fix kernel.randomize_va_space double read

Kees Cook (6):
      selftests/exec: Build both static and non-static load_address tests
      binfmt_elf: Calculate total_size earlier
      binfmt_elf: Honor PT_LOAD alignment for static PIE
      exec: Add KUnit test for bprm_stack_limits()
      execve: Keep bprm->argmin behind CONFIG_MMU
      exec: Avoid pathological argc, envc, and bprm->p values

 MAINTAINERS                                 |   2 +
 fs/Kconfig.binfmt                           |   8 ++
 fs/binfmt_elf.c                             |  99 ++++++++++++-------
 fs/exec.c                                   |  49 ++++++++--
 fs/exec_test.c                              | 141 ++++++++++++++++++++++++++++
 include/linux/binfmts.h                     |   2 +-
 tools/testing/selftests/exec/Makefile       |  19 ++--
 tools/testing/selftests/exec/load_address.c |  67 ++++++++++---
 8 files changed, 327 insertions(+), 60 deletions(-)
 create mode 100644 fs/exec_test.c

-- 
Kees Cook

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ