Ben Cotton wrote:
> ** Maintain the following patch sets for the Linux kernel, and
> possibly have them accepted in the upstream kernel:
> ***
> [//lore.kernel.org/linux-integrity/20210409114313.4073-1-
roberto.sa...@huawei.com/
> IMA execution policies] ***
> [//lore.kernel.org/linux-integrity/20210914163401.864635-1-
roberto.sa...@huawei.com/
> DIGLIM basic features] ***
> [//lore.kernel.org/linux-integrity/20210915163145.1046505-1-
roberto.sa...@huawei.com/
> DIGLIM advanced features] ***
> [//lore.kernel.org/linux-integrity/20210930115533.878169-1-
roberto.sa...@huawei.com/
> DIGLIM integration with IMA] ***
> [//lore.kernel.org/linux-integrity/20181112102423.30415-1-
roberto.sa...@huawei.com/
> PGP keys and signatures]

Can we trust the security code submitted by a Huawei employee to not contain 
hidden government-developed backdoors? (Basically the same question as for 
the existing NSA SELinux code…)

        Kevin Kofler
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure

Reply via email to