Files
msm-5.15/include/linux
Linus Torvalds 03b652e5c0 Merge branch 'fixes-v4.14-rc5' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security
Pull key handling fixes from James Morris:
 "This includes a fix for the capabilities code from Colin King, and a
  set of further fixes for the keys subsystem. From David:

   - Fix a bunch of places where kernel drivers may access revoked
     user-type keys and don't do it correctly.

   - Fix some ecryptfs bits.

   - Fix big_key to require CONFIG_CRYPTO.

   - Fix a couple of bugs in the asymmetric key type.

   - Fix a race between updating and finding negative keys.

   - Prevent add_key() from updating uninstantiated keys.

   - Make loading of key flags and expiry time atomic when not holding
     locks"

* 'fixes-v4.14-rc5' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security:
  commoncap: move assignment of fs_ns to avoid null pointer dereference
  pkcs7: Prevent NULL pointer dereference, since sinfo is not always set.
  KEYS: load key flags and expiry time atomically in proc_keys_show()
  KEYS: Load key expiry time atomically in keyring_search_iterator()
  KEYS: load key flags and expiry time atomically in key_validate()
  KEYS: don't let add_key() update an uninstantiated key
  KEYS: Fix race between updating and finding a negative key
  KEYS: checking the input id parameters before finding asymmetric key
  KEYS: Fix the wrong index when checking the existence of second id
  security/keys: BIG_KEY requires CONFIG_CRYPTO
  ecryptfs: fix dereference of NULL user_key_payload
  fscrypt: fix dereference of NULL user_key_payload
  lib/digsig: fix dereference of NULL user_key_payload
  FS-Cache: fix dereference of NULL user_key_payload
  KEYS: encrypted: fix dereference of NULL user_key_payload
2017-10-20 06:19:38 -04:00
..
2017-09-06 19:56:49 +02:00
2017-10-04 10:22:55 +02:00
2017-09-01 16:35:50 -05:00
2017-06-08 18:52:36 -07:00
2017-09-08 18:26:49 -07:00
2017-07-17 17:26:14 +02:00
2017-07-06 16:24:33 -07:00
2017-07-03 16:56:28 -06:00
2017-06-05 16:59:12 +02:00
2017-08-30 14:40:40 +02:00
2017-09-04 00:05:22 +02:00
2017-09-04 00:06:02 +02:00
2017-06-09 11:52:07 +02:00
2017-09-05 12:53:11 +02:00
2017-08-24 13:23:03 -07:00
2017-07-17 13:42:48 +02:00
2017-08-03 19:09:26 -07:00
2017-08-01 17:33:02 +02:00
2017-08-07 17:22:14 +02:00
2017-07-07 20:09:10 -04:00
2017-09-08 18:26:46 -07:00
2017-05-18 10:07:41 -04:00
2017-05-18 10:07:40 -04:00
2017-06-21 14:37:12 -04:00
2017-07-10 16:32:34 -07:00
2017-08-15 18:23:52 +02:00
2017-08-14 13:33:39 -07:00
2017-05-03 15:52:10 -07:00
2017-08-17 15:33:39 -04:00
2017-08-28 20:51:22 +02:00
2017-09-07 11:53:11 +02:00
2017-08-18 15:32:01 -07:00
2017-07-13 16:00:15 -04:00
2017-08-20 13:04:12 -04:00
2017-07-06 11:30:07 -04:00
2017-07-25 18:05:25 +02:00
2017-09-25 08:56:05 -06:00
2017-05-26 10:10:37 +02:00
2017-09-06 17:27:26 -07:00
2017-08-06 20:55:29 -07:00
2017-08-06 20:55:29 -07:00
2017-08-21 12:47:31 -07:00
2017-09-08 18:26:47 -07:00
2017-08-16 16:28:47 -07:00
2017-06-29 10:48:57 +01:00
2017-08-24 16:34:51 +02:00
2017-07-06 16:24:30 -07:00
2017-08-16 16:28:47 -07:00
2017-08-03 21:37:29 -07:00
2017-06-01 14:53:04 -04:00
2017-09-11 12:29:41 -04:00
2017-09-15 16:57:10 +02:00
2017-08-28 16:15:42 +02:00
2017-07-24 17:50:37 +02:00
2017-05-09 16:43:22 +03:00
2017-09-08 18:26:48 -07:00
2017-08-31 18:50:14 +02:00
2017-09-05 06:34:17 -07:00
2017-08-15 09:02:07 -07:00
2017-08-15 09:02:08 -07:00