linux_dsm_epyc7002/security/integrity
Roberto Sassu 221be106d7 evm: check hash algorithm passed to init_desc()
This patch prevents memory access beyond the evm_tfm array by checking the
validity of the index (hash algorithm) passed to init_desc(). The hash
algorithm can be arbitrarily set if the security.ima xattr type is not
EVM_XATTR_HMAC.

Fixes: 5feeb61183 ("evm: Allow non-SHA1 digital signatures")
Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com>
Cc: stable@vger.kernel.org
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
2019-05-29 23:18:25 -04:00
..
evm evm: check hash algorithm passed to init_desc() 2019-05-29 23:18:25 -04:00
ima ima: fix wrong signed policy requirement when not appraising 2019-05-19 20:27:12 -04:00
platform_certs s390/ipl: read IPL report at early boot 2019-04-26 12:34:05 +02:00
digsig_asymmetric.c integrity: support EC-RDSA signatures for asymmetric_verify 2019-04-18 22:15:03 +08:00
digsig.c integrity, KEYS: add a reference to platform keyring 2019-02-04 17:29:19 -05:00
iint.c get rid of legacy 'get_ds()' function 2019-03-04 10:50:14 -08:00
integrity_audit.c
integrity.h
Kconfig s390/ipl: read IPL report at early boot 2019-04-26 12:34:05 +02:00
Makefile s390/ipl: read IPL report at early boot 2019-04-26 12:34:05 +02:00