Ben Cotton wrote:
> ** Maintain the following patch sets for the Linux kernel, and
> possibly have them accepted in the upstream kernel:
> ***
> [//lore.kernel.org/linux-integrity/20210409114313.4073-1-
[email protected]/
> IMA execution policies] ***
> [//lore.kernel.org/linux-integrity/20210914163401.864635-1-
[email protected]/
> DIGLIM basic features] ***
> [//lore.kernel.org/linux-integrity/20210915163145.1046505-1-
[email protected]/
> DIGLIM advanced features] ***
> [//lore.kernel.org/linux-integrity/20210930115533.878169-1-
[email protected]/
> DIGLIM integration with IMA] ***
> [//lore.kernel.org/linux-integrity/20181112102423.30415-1-
[email protected]/
> PGP keys and signatures]
Can we trust the security code submitted by a Huawei employee to not contain
hidden government-developed backdoors? (Basically the same question as for
the existing NSA SELinux code…)
Kevin Kofler
_______________________________________________
devel mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam on the list, report it:
https://pagure.io/fedora-infrastructure