From patchwork Wed Nov 6 18:35:34 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jarkko Sakkinen X-Patchwork-Id: 13865239 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5E051208220; Wed, 6 Nov 2024 18:35:38 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1730918139; cv=none; b=Shos5EP+Srs9mlhG3Ue2baS/OXzK/CIFz/RLhxGf3Ks6cYdrKzk+Nd7OFOWYKds/wvtt6jJ1kdrtysP47waeMShwviD7G5qTyjFQR62ImzryUgJjVDp6+psdx/nfrHWVEGGnZXIwg6C1iKHKb45IhgN1+su2Wvgoz9K4DEtnGD4= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1730918139; c=relaxed/simple; bh=lSepakk3yilD/WdqaDpUJpzRegdFgY39i/wXKvhEaOI=; h=Mime-Version:Content-Type:Date:Message-Id:Cc:Subject:From:To; b=OC42HE8t8lFZU43vbQlOoDBSRH3+MBPeQfNVi9VShSAp6w3vL28H1dUMyPcwRFgVrEZ0dlYTQXYcU94KbZNc1LnEgEbGX6iqbc6htRT1Ve5rYpC61ThN+LQORAW72DIoVMwxsNLVJw9+aG+7LA6UeWqxhqDdnMUinIyvBUlxUy4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=E0rqJxpa; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="E0rqJxpa" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 61752C4CEC6; Wed, 6 Nov 2024 18:35:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1730918138; bh=lSepakk3yilD/WdqaDpUJpzRegdFgY39i/wXKvhEaOI=; h=Date:Cc:Subject:From:To:From; b=E0rqJxpaFnNKtbu0YPAHQGfElD8r+lT+Ztp/a9rLB3h0Hsd/i1Ib+ro6YBcwXTSB0 Vd9xJYvvCCnjwS3Pgj8iHTgBT4pPzr0XyPLvfLL2s92DwUeh7exP+3djhAbAXo+usy kFXEFYrukxsNJA4Ft5RCzZNZAh2EyYkvNa+7A+Gc3qJdRwVUMBdBdZtHHjXW/eD2PW nbXM8ID1s1LjJwLre9dYMmaAHBKNqPdkyIMpoFMqFa7+d0iGWNhO1eHUDcsLYdu31G gosMeg5q8JTMlIIJFgieWMtnW9qvY/ZhH4IweeUJb2k9zblBrsHH9dVCDd648xTJxQ A3mmHTSaHXU0A== Precedence: bulk X-Mailing-List: linux-integrity@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 Date: Wed, 06 Nov 2024 20:35:34 +0200 Message-Id: Cc: "David Howells" , "Herbert Xu" , "David S. Miller" , , Subject: [GIT PULL] KEYS: keys-next-6.12-rc7 From: "Jarkko Sakkinen" To: "Linus Torvalds" X-Mailer: aerc 0.18.2 The following changes since commit 557329bcecc2f55e134db8974953b32b69db9d15: Merge tag 'mmc-v6.12-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/ulfh/mmc (2024-11-04 08:07:22 -1000) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/jarkko/linux-tpmdd.git tags/keys-next-6.12-rc7 for you to fetch changes up to 04de7589e0a95167d803ecadd115235ba2c14997: KEYS: trusted: dcp: fix NULL dereference in AEAD crypto operation (2024-11-04 21:24:24 +0200) ---------------------------------------------------------------- Hi, Couple of fixes for keys and trusted keys. For me it id not make (common) sense to separate them into separate them into separate keys and trusted keys PR's. BR, Jarkko ---------------------------------------------------------------- Chen Ridong (1): security/keys: fix slab-out-of-bounds in key_task_permission David Gstir (1): KEYS: trusted: dcp: fix NULL dereference in AEAD crypto operation security/keys/keyring.c | 7 +++++-- security/keys/trusted-keys/trusted_dcp.c | 9 +++++---- 2 files changed, 10 insertions(+), 6 deletions(-)