summaryrefslogtreecommitdiff
path: root/security (follow)
Commit message (Expand)AuthorAge
* ima: fix showing large 'violations' or 'runtime_measurements_count'Eric Biggers2018-11-21
* KEYS: put keyring if install_session_keyring_to_cred() failsEric Biggers2018-11-10
* selinux: use GFP_NOWAIT in the AVC kmem_cachesMichal Hocko2018-09-19
* Smack: Mark inode instant in smack_task_to_inodeCasey Schaufler2018-08-24
* selinux: KASAN: slab-out-of-bounds in xattr_getsecuritySachin Grover2018-06-06
* Revert "ima: limit file hash setting by user to fix and log modes"Mimi Zohar2018-06-06
* ima: Fallback to the builtin hash algorithmPetr Vorel2018-05-30
* ima: Fix Kconfig to select TPM 2.0 CRB interfaceJiandi An2018-05-30
* selinux: do not check open permission on socketsStephen Smalley2018-04-13
* selinux: Remove redundant check for unknown labeling behaviorMatthias Kaehlcke2018-04-08
* selinux: Remove unnecessary check of array base in selinux_set_mapping()Matthias Kaehlcke2018-04-08
* ima: relax requiring a file signature for new files with zero lengthMimi Zohar2018-03-22
* apparmor: Make path_max parameter readonlyJohn Johansen2018-03-22
* selinux: check for address length in selinux_socket_bind()Alexander Potapenko2018-03-22
* selinux: skip bounded transition processing if the policy isn't loadedPaul Moore2018-02-25
* selinux: ensure the context is NUL terminated in security_context_to_sid_core()Paul Moore2018-02-25
* KEYS: encrypted: fix buffer overread in valid_master_desc()Eric Biggers2018-02-16
* selinux: general protection fault in sock_has_permMark Salyzyn2018-02-03
* KPTI: Rename to PAGE_TABLE_ISOLATIONKees Cook2018-01-05
* x86/kaiser: Reenable PARAVIRTBorislav Petkov2018-01-05
* kaiser: delete KAISER_REAL_SWITCH optionHugh Dickins2018-01-05
* kaiser: KAISER depends on SMPHugh Dickins2018-01-05
* kaiser: merged updateDave Hansen2018-01-05
* KAISER: Kernel Address IsolationRichard Fellner2018-01-05
* KEYS: add missing permission check for request_key() destinationEric Biggers2017-12-20
* ima: fix hash algorithm initializationBoshi Wang2017-12-09
* ima: do not update security.ima if appraisal status is not INTEGRITY_PASSRoberto Sassu2017-11-24
* security/keys: add CONFIG_KEYS_COMPAT to KconfigBilal Amarni2017-11-18
* KEYS: trusted: fix writing past end of buffer in trusted_read()Eric Biggers2017-11-15
* KEYS: trusted: sanitize all key materialEric Biggers2017-11-15
* KEYS: return full count in keyring_read() if buffer is too smallEric Biggers2017-11-08
* KEYS: Fix race between updating and finding a negative keyDavid Howells2017-10-27
* KEYS: don't let add_key() update an uninstantiated keyDavid Howells2017-10-27
* KEYS: encrypted: fix dereference of NULL user_key_payloadEric Biggers2017-10-27
* lsm: fix smack_inode_removexattr and xattr_getsecurity memleakCasey Schaufler2017-10-12
* KEYS: prevent KEYCTL_READ on negative keyEric Biggers2017-10-05
* KEYS: prevent creating a different user's keyringsEric Biggers2017-10-05
* KEYS: fix writing past end of user-supplied buffer in keyring_read()Eric Biggers2017-10-05
* KEYS: Fix an error code in request_master_key()Dan Carpenter2017-07-15
* KEYS: fix freeing uninitialized memory in key_update()Eric Biggers2017-06-14
* KEYS: fix dereferencing NULL payload with nonzero lengthEric Biggers2017-06-14
* ima: accept previously set IMA_NEW_FILEDaniel Glöckner2017-05-25
* KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyringsEric Biggers2017-04-27
* KEYS: Change the name of the dead type to ".dead" to prevent user accessDavid Howells2017-04-27
* KEYS: Disallow keyrings beginning with '.' to be joined as session keyringsDavid Howells2017-04-27
* selinux: fix off-by-one in setprocattrStephen Smalley2017-02-14
* apparmor: fix change_hat not finding hat after policy replacementJohn Johansen2016-12-02
* KEYS: Fix short sprintf buffer in /proc/keys show functionDavid Howells2016-11-10
* ima: use file_dentry()Miklos Szeredi2016-10-16
* apparmor: fix ref count leak when profile sha1 hash is readJohn Johansen2016-08-16