-
- Downloads
Merge tag 'integrity-v5.10' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity
Pull integrity updates from Mimi Zohar: "Continuing IMA policy rule cleanup and validation in particular for measuring keys, adding/removing/updating informational and error messages (e.g. "ima_appraise" boot command line option), and other bug fixes (e.g. minimal data size validation before use, return code and NULL pointer checking)" * tag 'integrity-v5.10' of git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity: ima: Fix NULL pointer dereference in ima_file_hash evm: Check size of security.evm before using it ima: Remove semicolon at the end of ima_get_binary_runtime_size() ima: Don't ignore errors from crypto_shash_update() ima: Use kmemdup rather than kmalloc+memcpy integrity: include keyring name for unknown key request ima: limit secure boot feedback scope for appraise integrity: invalid kernel parameters feedback ima: add check for enforced appraise option integrity: Use current_uid() in integrity_audit_message() ima: Fail rule parsing when asymmetric key measurement isn't supportable ima: Pre-parse the list of keyrings in a KEY_CHECK rule
No related branches found
No related tags found
Showing
- security/integrity/digsig_asymmetric.c 8 additions, 2 deletionssecurity/integrity/digsig_asymmetric.c
- security/integrity/evm/evm_main.c 9 additions, 0 deletionssecurity/integrity/evm/evm_main.c
- security/integrity/ima/ima_appraise.c 19 additions, 8 deletionssecurity/integrity/ima/ima_appraise.c
- security/integrity/ima/ima_crypto.c 2 additions, 0 deletionssecurity/integrity/ima/ima_crypto.c
- security/integrity/ima/ima_main.c 19 additions, 4 deletionssecurity/integrity/ima/ima_main.c
- security/integrity/ima/ima_policy.c 102 additions, 51 deletionssecurity/integrity/ima/ima_policy.c
- security/integrity/ima/ima_queue.c 1 addition, 1 deletionsecurity/integrity/ima/ima_queue.c
- security/integrity/integrity_audit.c 1 addition, 1 deletionsecurity/integrity/integrity_audit.c
Loading
Please register or sign in to comment