Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: [syzbot] KASAN: use-after-free Read in sock_has_perm, (continued)
- [selinux-testsuite PATCH] tests/binder: remove stray flag files with 'make clean',
Paul Moore
- [PATCH v5 0/4] Introduce security_create_user_ns(),
Frederick Lawler
- [BUG] (fsuse xattr "fuse" mycontext) causes deadlock for mount/sync syscall, bauen1
- [PATCH] tests/sctp: reenable the SCTP ASCONF tests, Paul Moore
- [PATCH] tests/sctp: allow both ENOSPC and EINPROGRESS for CIPSO tag space errors,
Paul Moore
- [PATCH] selinux: SCTP fixes, including ASCONF,
Paul Moore
- [PATCH 1/4] ci: bump versions in GitHub Actions,
Christian Göttsche
- [PATCH 1/2] checkpolicy: use strict function prototype for definitions,
Christian Göttsche
- [PATCH] libselinux/utils: install into bin PATH,
Christian Göttsche
- [PATCH] libselinux: avoid newline in avc message,
Christian Göttsche
- [PATCH] selinux: add a new warn_on_audited debug flag to selinuxfs,
Ondrej Mosnacek
- Re: Race conditioned discovered between ima_match_rules and ima_update_lsm_update_rules,
Guozihua (Scott)
- [PATCH AUTOSEL 4.9 8/8] selinux: Add boundary check in put_entry(), Sasha Levin
- [PATCH AUTOSEL 4.14 12/12] selinux: Add boundary check in put_entry(), Sasha Levin
- [PATCH AUTOSEL 5.4 23/23] selinux: Add boundary check in put_entry(), Sasha Levin
- [PATCH AUTOSEL 4.19 16/16] selinux: Add boundary check in put_entry(), Sasha Levin
- [PATCH AUTOSEL 5.15 42/45] selinux: fix memleak in security_read_state_kernel(), Sasha Levin
- [PATCH AUTOSEL 5.10 29/29] selinux: Add boundary check in put_entry(), Sasha Levin
- [PATCH AUTOSEL 5.15 43/45] selinux: Add boundary check in put_entry(), Sasha Levin
- [PATCH AUTOSEL 5.18 51/53] selinux: Add boundary check in put_entry(), Sasha Levin
- [PATCH AUTOSEL 5.18 50/53] selinux: fix memleak in security_read_state_kernel(), Sasha Levin
- [PATCH AUTOSEL 5.19 53/58] selinux: fix memleak in security_read_state_kernel(), Sasha Levin
- [PATCH AUTOSEL 5.19 54/58] selinux: Add boundary check in put_entry(), Sasha Levin
- [PATCH v3] nfs: Fix automount superblock LSM init problem, preventing sb sharing,
David Howells
- [PATCH v2] nfs: Fix automount superblock LSM init problem, preventing sb sharing,
David Howells
- [PATCH] nfs: Fix automount superblock LSM init problem, preventing sb sharing,
David Howells
- LSM stacking in next for 6.1?,
Casey Schaufler
- [GIT PULL] SELinux patches for v6.0,
Paul Moore
- [PATCH v4 0/4] Introduce security_create_user_ns(),
Frederick Lawler
- Adjust sepolgen grammar to support allowxperm, et. al.,
chris . lindee
- KVM / virtual networking access control,
Karl MacMillan
- [PATCH testsuite 00/24] Clean up testsuite policy and support running as sysadm_t,
Ondrej Mosnacek
- [PATCH testsuite 01/24] keys: change test_newcon_key_t to be just an object context, Ondrej Mosnacek
- [PATCH testsuite 02/24] test_global.te: remove unused role require, Ondrej Mosnacek
- [PATCH testsuite 03/24] test_global.te: don't add domains to system_r, Ondrej Mosnacek
- [PATCH testsuite 06/24] test_policy.if: remove weird rule from testsuite_domain_type_minimal(), Ondrej Mosnacek
- [PATCH testsuite 07/24] policy: move unconfined_t-related dontaudit rule to where it fits better, Ondrej Mosnacek
- [PATCH testsuite 09/24] policy: move miscfiles_domain_entry_test_files() to general policy, Ondrej Mosnacek
- [PATCH testsuite 08/24] policy: move userdom_sysadm_entry_spec_domtrans_to() to general policy, Ondrej Mosnacek
- [PATCH testsuite 11/24] test_general.te: move sysadm-related rules into an optional block, Ondrej Mosnacek
- [PATCH testsuite 12/24] test_filesystem.te: remove redundant dontaudit rules, Ondrej Mosnacek
- [PATCH testsuite 13/24] test_filesystem.te: remove suspicious rules, Ondrej Mosnacek
- [PATCH testsuite 14/24] tests/nnp_nosuid: avoid hardcoding unconfined_t in the policy, Ondrej Mosnacek
- [PATCH testsuite 10/24] policy: substitute userdom_sysadm_entry_spec_domtrans_to(), Ondrej Mosnacek
- [PATCH testsuite 15/24] tests/*filesystem: remove weird uses of unconfined_t, Ondrej Mosnacek
- [PATCH testsuite 17/24] test_general.te: generalize the dontaudit rule, Ondrej Mosnacek
- [PATCH testsuite 18/24] policy: don't audit testsuite programs searching the caller's keys, Ondrej Mosnacek
- [PATCH testsuite 16/24] policy: remove last hardcoded references to unconfined_t, Ondrej Mosnacek
- [PATCH testsuite 19/24] ci: check for unconfined_t AVCs, Ondrej Mosnacek
- [PATCH testsuite 22/24] policy: give sysadm_t perms needed to run quotacheck(8), Ondrej Mosnacek
- [PATCH testsuite 23/24] tests/vsock_socket: use modprobe to check vsock availability, Ondrej Mosnacek
- [PATCH testsuite 24/24] ci: add sysadm_t to the test matrix, Ondrej Mosnacek
- [PATCH testsuite 21/24] tests/overlay: don't hard-code SELinux user of the caller, Ondrej Mosnacek
- [PATCH testsuite 20/24] tests/binder: check only the type part of the context, Ondrej Mosnacek
- Re: [PATCH testsuite 00/24] Clean up testsuite policy and support running as sysadm_t, Ondrej Mosnacek
- [PATCH v3 0/4] Introduce security_create_user_ns(),
Frederick Lawler
- [PATCH v2 1/5] libsepol: rename validate_policydb to policydb_validate,
Christian Göttsche
- [PATCH v3 1/8] libsepol: refactor ebitmap conversion in link.c,
Christian Göttsche
- [PATCH v2 1/7] libsepol/tests: add ebitmap tests,
Christian Göttsche
- [PATCH] tests/sctp: remove assumptions in the SCTP tests,
Paul Moore
- [PATCH testsuite] tests/module_load: detect the linker to use for module build,
Ondrej Mosnacek
- [PATCH 1/5] libsepol: rename validate_policydb to policydb_validate,
Christian Göttsche
- [PATCH 1/3] libsepol: break circular include,
Christian Göttsche
- [PATCH 1/7] libsepol/tests: add ebitmap tests,
Christian Göttsche
- [RFC PATCH RESEND] userfaultfd: open userfaultfds with O_RDONLY,
Ondrej Mosnacek
- [PATCH v2 0/4] Introduce security_create_user_ns(),
Frederick Lawler
- Re: [PATCH v2 0/4] Introduce security_create_user_ns(), Christian Göttsche
[PATCH] libselinux: set errno to EBADF on O_PATH emulation failure,
Christian Göttsche
What is "fscon" statement in a base policy?,
Nicolas Iooss
[PATCH] libsepol: do not modify policy during write,
Christian Göttsche
[syzbot] KASAN: use-after-free Read in selinux_socket_recvmsg,
syzbot
[PATCH] libsepol/utils: improve wording,
Christian Göttsche
[PATCH userspace 1/1] CircleCI: do not add Debian-specific parameter when invoking setup.py,
Nicolas Iooss
[PATCH userspace 1/1] libsepol: initialize s in constraint_expr_eval_reason,
Nicolas Iooss
[PATCH testsuite 0/2] Make the keys test pass in FIPS mode,
Ondrej Mosnacek
[PATCH v37 00/33] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v37 01/33] integrity: disassociate ima_filter_rule from security_audit_rule, Casey Schaufler
- [PATCH v37 02/33] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v37 05/33] IMA: avoid label collisions with stacked LSMs, Casey Schaufler
- [PATCH v37 04/33] LSM: provide lsm name and id slot mappings, Casey Schaufler
- [PATCH v37 03/33] LSM: Add the lsmblob data structure., Casey Schaufler
- [PATCH v37 06/33] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v37 07/33] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v37 08/33] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v37 09/33] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v37 10/33] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v37 11/33] LSM: Use lsmblob in security_current_getsecid, Casey Schaufler
- [PATCH v37 12/33] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v37 13/33] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v37 14/33] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v37 15/33] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v37 16/33] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v37 17/33] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v37 20/33] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v37 18/33] LSM: Use lsmcontext in security_dentry_init_security, Casey Schaufler
- [PATCH v37 19/33] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v37 22/33] LSM: security_secid_to_secctx module selection, Casey Schaufler
- [PATCH v37 23/33] Audit: Keep multiple LSM data in audit_names, Casey Schaufler
- [PATCH v37 21/33] binder: Pass LSM identifier for confirmation, Casey Schaufler
- [PATCH v37 24/33] Audit: Create audit_stamp structure, Casey Schaufler
- [PATCH v37 25/33] LSM: Add a function to report multiple LSMs, Casey Schaufler
- [PATCH v37 26/33] Audit: Allow multiple records in an audit_buffer, Casey Schaufler
- [PATCH v37 29/33] Audit: Add record for multiple object contexts, Casey Schaufler
- [PATCH v37 27/33] Audit: Add record for multiple task security contexts, Casey Schaufler
- [PATCH v37 28/33] audit: multiple subject lsm values for netlabel, Casey Schaufler
- [PATCH v37 31/33] LSM: Removed scaffolding function lsmcontext_init, Casey Schaufler
- [PATCH v37 30/33] netlabel: Use a struct lsmblob in audit data, Casey Schaufler
- [PATCH v37 32/33] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v37 33/33] AppArmor: Remove the exclusive flag, Casey Schaufler
- Re: [PATCH v37 00/33] LSM: Module stacking for AppArmor, John Johansen
[PATCH] gettext: handle unsupported languages properly,
Vit Mojzis
[PATCH -next] selinux: Cleanup the enum SEL_COMPAT_NET,
Xiu Jianfeng
[PATCH RESEND -next] selinux: Let the caller free the momory in *mnt_opts on error,
Xiu Jianfeng
[GIT PULL] SELinux fixes for v5.19 (#1),
Paul Moore
PHP-FPM restriction bug, Father Vlasie
[RFC PATCH 1/4] libsepol: refactor ebitmap conversion in link.c,
Christian Göttsche
[PATCH -next] selinux: Let the caller free the momory in *mnt_opts on error,
Xiu Jianfeng
[PATCH] python: remove IOError in certain cases,
Elijah Conners
hack, Mikhail
[PATCH] selinux: free contexts previously transferred in selinux_add_opt(),
Christian Göttsche
[PATCH -next] selinux: Fix memleak in security_read_policy,
Xiu Jianfeng
[PATCH 1/4] support Dash as default shell,
Christian Göttsche
[PATCH -next] selinux: Add boundary check in put_entry(),
Xiu Jianfeng
[PATCH -next] selinux: Fix memleak in security_read_state_kernel,
Xiu Jianfeng
[PATCH -next] selinux: Fix potential memory leak in selinux_add_opt,
Xiu Jianfeng
[PATCH] checkpolicy: error out if required permission would exceed limit,
Christian Göttsche
[PATCH] libsepol: avoid potential NULL dereference on optional parameter,
Christian Göttsche
[PATCH v36 00/33] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v36 01/33] integrity: disassociate ima_filter_rule from security_audit_rule, Casey Schaufler
- [PATCH v36 02/33] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v36 04/33] LSM: provide lsm name and id slot mappings, Casey Schaufler
- [PATCH v36 03/33] LSM: Add the lsmblob data structure., Casey Schaufler
- [PATCH v36 05/33] IMA: avoid label collisions with stacked LSMs, Casey Schaufler
- [PATCH v36 06/33] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v36 08/33] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v36 07/33] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v36 09/33] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v36 11/33] LSM: Use lsmblob in security_current_getsecid, Casey Schaufler
- [PATCH v36 10/33] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v36 12/33] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v36 13/33] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v36 14/33] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v36 15/33] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v36 17/33] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v36 16/33] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v36 18/33] LSM: Use lsmcontext in security_dentry_init_security, Casey Schaufler
- [PATCH v36 19/33] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v36 20/33] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v36 22/33] LSM: Extend security_secid_to_secctx to include module selection, Casey Schaufler
- [PATCH v36 23/33] Audit: Keep multiple LSM data in audit_names, Casey Schaufler
- [PATCH v36 21/33] binder: Pass LSM identifier for confirmation, Casey Schaufler
- [PATCH v36 24/33] Audit: Create audit_stamp structure, Casey Schaufler
- [PATCH v36 25/33] LSM: Add a function to report multiple LSMs, Casey Schaufler
- [PATCH v36 26/33] Audit: Allow multiple records in an audit_buffer, Casey Schaufler
- [PATCH v36 27/33] Audit: Add record for multiple task security contexts, Casey Schaufler
- [PATCH v36 29/33] Audit: Add record for multiple object contexts, Casey Schaufler
- [PATCH v36 28/33] audit: multiple subject lsm values for netlabel, Casey Schaufler
- [PATCH v36 31/33] LSM: Removed scaffolding function lsmcontext_init, Casey Schaufler
- [PATCH v36 30/33] netlabel: Use a struct lsmblob in audit data, Casey Schaufler
- [PATCH v36 32/33] LSM: Add /proc attr entry for full LSM context, Casey Schaufler
- [PATCH v36 33/33] AppArmor: Remove the exclusive flag, Casey Schaufler
[PATCH] selinux: fix typos in comments,
Jonas Lindner
[PATCH userspace 0/2] Refine semantics of libsemanage's check_ext_changes,
Ondrej Mosnacek
[PATCH v3] cred: Propagate security_prepare_creds() error code,
Frederick Lawler
why arent we checking MS_BIND?, Dominick Grift
[RFC PATCH 1/3] libsepol: export initial SIDs,
Christian Göttsche
[RFC PATCH] f*xattr: allow O_PATH descriptors,
Christian Göttsche
[PATCH] libsepol: fix validation of user declarations in modules,
Christian Göttsche
[PATCH] libsepol: Drop unused assignment,
Petr Lautrbach
[PATCH testsuite] tests/sctp: temporarily disable ASCONF tests,
Ondrej Mosnacek
Bug in SELinux SCTP ASCONF handling,
Ondrej Mosnacek
[PATCH] Revert "libselinux: restorecon: pin file to avoid TOCTOU issues",
Petr Lautrbach
[PATCH] python: Split "semanage import" into two transactions,
Vit Mojzis
[PATCH 1/1] libselinux: do not return the cached prev_current value when using getpidcon(),
Nicolas Iooss
[PATCH v2] cred: Propagate security_prepare_creds() error code,
Frederick Lawler
[GIT PULL] SELinux patches for v5.19,
Paul Moore
[SELinux-notebook PATCH] network_support.md: clarify local port range and name_bind,
Dominick Grift
[PATCH] cred: Propagate security_prepare_creds() error code,
Frederick Lawler
ANN: Reference Policy 2.20220520, Chris PeBenito
[PATCH] semodule: avoid toctou on output module,
Christian Göttsche
[PATCH] libselinux: declare return value of context_str(3) const,
Christian Göttsche
[PATCH 1/4] libselinux: add man page redirections,
Christian Göttsche
[PATCH] Makefile: always include and link with DESTDIR,
Christian Göttsche
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]