diff options
author | 2017-04-20 11:12:51 -0700 | |
---|---|---|
committer | 2017-04-20 11:12:51 -0700 | |
commit | f205b5dc1c9e62237ac6e21642724d8cbc85f7ee (patch) | |
tree | 73d32927586b80b6ceaaac8380b8ddd8c45024b7 /tools/perf/util/scripting-engines/trace-event-python.c | |
parent | Merge tag 'clk-fixes-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/clk/linux (diff) | |
parent | KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings (diff) | |
download | wireguard-linux-f205b5dc1c9e62237ac6e21642724d8cbc85f7ee.tar.xz wireguard-linux-f205b5dc1c9e62237ac6e21642724d8cbc85f7ee.zip |
Merge tag 'keys-fixes-20170419' of git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs
Pull keyrings fixes from David Howells:
(1) Disallow keyrings whose name begins with a '.' to be joined
[CVE-2016-9604].
(2) Change the name of the dead type to ".dead" to prevent user access
[CVE-2017-6951].
(3) Fix keyctl_set_reqkey_keyring() to not leak thread keyrings
[CVE-2017-7472]
* tag 'keys-fixes-20170419' of git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs:
KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings
KEYS: Change the name of the dead type to ".dead" to prevent user access
KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings
Diffstat (limited to 'tools/perf/util/scripting-engines/trace-event-python.c')
0 files changed, 0 insertions, 0 deletions