Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- Re: [Non-DoD Source] [PATCH 1/1] libsepol: do not use uninitialized value for low_value, (continued)
- [PATCH rdma-rc v1 0/4] IB selinux related fixes,
Leon Romanovsky
- [PATCH] libsepol: Fix RESOURCE_LEAK defects reported by coverity scan,
James Carter
- gcc 9.0.0 build issues,
Petr Lautrbach
- [PATCH] python/semanage/seobject: Fix listing boolean values,
Vit Mojzis
- [PATCH 0/3] Support flake8 version 3.7,
Nicolas Iooss
- [PATCH 1/2] libselinux: set an appropriate errno in booleans.c,
Petr Lautrbach
- [PATCH] dbus: Fix name of polkit function,
Petr Lautrbach
- [PATCH] python/semanage: Examples are no longer in the main semanage man page,
Petr Lautrbach
- [PATCH] scripts/release: Update links to use release assets instead of wiki links,
Petr Lautrbach
- [PATCH 1/3] libsepol: Fix RESOURCE_LEAK defects reported by coverity scan,
Petr Lautrbach
- runcon in enforcing mode,
Ian Pilcher
- KASAN: use-after-free Read in selinux_netlbl_socket_setsockopt,
syzbot
- Why is bash calling ioctl?,
Ian Pilcher
- [PATCH] python/restorecon: add force option,
Viktor Ashirov
- [PATCH v3 0/5] Allow initializing the kernfs node's secctx based on its parent,
Ondrej Mosnacek
- [PATCH v2] selinux: replace BUG_ONs with WARN_ONs in avc.c,
Ondrej Mosnacek
- [PATCH rdma-next] IB/core: Don't register MAD agents for LSM notifications,
Leon Romanovsky
- [PATCH] selinux: replace BUG_ONs with WARN_ONs in avc.c,
Ondrej Mosnacek
- ANN: SELinux userspace 2.9-rc1 release candidate, Petr Lautrbach
- [PATCH v3 0/4] Report raw context in AVCs + refactoring,
Ondrej Mosnacek
- [GitHub PR #118] Add russian translations for man pages,
Petr Lautrbach
- [PATCH] restorecond: Install DBUS service file with 644 permissions,
Petr Lautrbach
- [PATCH v2] selinux: log invalid contexts in AVCs,
Ondrej Mosnacek
- [PATCH 1/3] Travis-CI: upgrade PyPy to 6.0,
Nicolas Iooss
- [RFC PATCH] selinux: log invalid contexts in AVCs,
Ondrej Mosnacek
- [PATCH 1/1] libselinux: do not dereference symlink with statfs in selinux_restorecon,
Nicolas Iooss
- Bug Report: bug if selinux_msg_queue_msgsnd & and selinux_msg_queue_msgrcv,
John Johansen
- [GIT PULL] SELinux fixes for v5.0 (#1),
Paul Moore
- Re: Kernel memory corruption in CIPSO labeled TCP packets processing.,
Casey Schaufler
- [PATCH 1/1] python/sepolicy: initialize mislabeled_files in __init__(),
Nicolas Iooss
- RFC: introduce new library versions for added symbols,
Petr Lautrbach
- [PATCH v2] setsebool: support use of -P on SELinux-disabled hosts,
Stephen Smalley
- [PATCH] setsebool: support use of -P on SELinux-disabled hosts, Stephen Smalley
- Re: [PATCH] security/selinux/hooks: remove unneeded semicolon, Paul Moore
- last call for selinux 2.9-rc1 release, Petr Lautrbach
- [PATCH v2 0/3] Allow initializing the kernfs node's secctx based on its parent,
Ondrej Mosnacek
- general protection fault in ebitmap_destroy,
syzbot
- [PATCH 0/3] Allow initializing the kernfs node's secctx based on its parent,
Ondrej Mosnacek
[PATCH] selinux: avc: mark avc node as not a leak,
Prateek Patel
[PATCH AUTOSEL 4.20 032/117] selinux: always allow mounting submounts, Sasha Levin
[PATCH AUTOSEL 4.19 25/97] selinux: always allow mounting submounts, Sasha Levin
[PATCH AUTOSEL 4.14 12/53] selinux: always allow mounting submounts, Sasha Levin
[PATCH AUTOSEL 4.9 09/36] selinux: always allow mounting submounts, Sasha Levin
[PATCH v2] libsemanage: set selinux policy root around calls to selinux_boolean_sub,
Stephen Smalley
[PATCH] libsemanage: set selinux policy root around calls to selinux_boolean_sub, Stephen Smalley
[PATCH 0/5] Run tests in python/ with "make test",
Nicolas Iooss
[PATCH 1/1] scripts/run-flake8: run on Python scripts not ending with .py,
Nicolas Iooss
[PATCH 1/2] python/semanage: explain why sepolicy is imported in a function,
Nicolas Iooss
selinux list move final notice, Stephen Smalley
[PATCH] libsemanage: Always set errno to 0 before calling getpwent(),
Laurent Bigonville
[V2 PATCH 1/3] Makefile: fix _FORTIFY_SOURCE redefined build error,
bill . c . roberts
[GIT PULL] SELinux patches v4.21,
Paul Moore
[large PATCH on GitHub] python/sepolgen: upgrade ply to release 3.11,
Nicolas Iooss
[PATCH 1/4] python/sepolgen: close /etc/selinux/sepolgen.conf after parsing it,
Nicolas Iooss
[PATCH v2 0/2] Fix SELinux context mount with the cgroup filesystem,
Ondrej Mosnacek
Fix semanage in envinronment without default policy or when -S <store> is used,
Petr Lautrbach
[PATCH 1/3] semanage_migrate_store: fix many Python linter warnings,
Nicolas Iooss
[PATCH] mcstrans: Fix check in raw_color(),
Petr Lautrbach
Fwd: [PATCH 3/7] selinux: convert to kvmalloc,
Stephen Smalley
[PATCH 1/1] python/sepolgen: always indent with 4 spaces,
Nicolas Iooss
[PATCH 1/2] mcstrans: convert test scripts to Python 3,
Nicolas Iooss
[PATCH 1/2] Makefile: fix _FORTIFY_SOURCE redefined build error,
bill . c . roberts
[RFC PATCH 0/3] Fix SELinux context mount with the cgroup filesystem,
Ondrej Mosnacek
SELinux testsuite failure in overlayfs with v4.20-rc kernels,
James Morris
[PATCH] python/sepolicy: search() also for dontaudit rules,
Petr Lautrbach
[PATCH 1/2] selinux: avoid silent denials in permissive mode under RCU walk,
Stephen Smalley
[PATCH 1/1] python/semanage: do not show "None" levels when using a non-MLS policy,
Nicolas Iooss
[PATCH 1/2] python/chcat: improve the code readability,
Nicolas Iooss
[RFC PATCH v2 1/2] selinux: avoid silent denials in permissive mode under RCU walk,
Stephen Smalley
[RFC][PATCH] selinux: avoid silent denials in permissive mode under RCU walk,
Stephen Smalley
[PATCH] python/semanage: Start exporting "ibendport" and "ibpkey" entries,
Vit Mojzis
[PATCH] python/semanage: Include MCS/MLS range when exporting local customizations,
Vit Mojzis
SELinux logging problem,
BMK
[PATCH] python/chcat: use check_call instead of getstatusoutput,
Petr Lautrbach
[RFC PATCH v4 0/2] Fix ENOMEM errors during policy reload,
Ondrej Mosnacek
Kernel Ueventd KConfig,
William Roberts
Security modules and sending signals within the same process,
Florian Weimer
[GIT PULL] SELinux fixes for v4.20 (#2),
Paul Moore
[RFC PATCH v3 0/9] Fix ENOMEM errors during policy reload,
Ondrej Mosnacek
[PATCH] selinux: add support for RTM_NEWCHAIN, RTM_DELCHAIN, and RTM_GETCHAIN,
Paul Moore
[PATCH] selinux-testsuite: enable multiport netfilter match for sctp tests,
Stephen Smalley
overlayfs access checks on underlying layers,
Miklos Szeredi
[PATCH v5 00/38] LSM: Module stacking for SARA and Landlock,
Casey Schaufler
- [PATCH v5 11/38] LSM: Separate idea of "major" LSM from "exclusive" LSM, Casey Schaufler
- [PATCH v5 12/38] apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUE, Casey Schaufler
- [PATCH v5 07/38] LSM: Introduce "lsm=" for boottime LSM selection, Casey Schaufler
- [PATCH v5 14/38] LSM: Add all exclusive LSMs to ordered initialization, Casey Schaufler
- [PATCH v5 13/38] selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUE, Casey Schaufler
- [PATCH v5 18/38] LSM: Introduce enum lsm_order, Casey Schaufler
- [PATCH v5 16/38] LoadPin: Initialize as ordered LSM, Casey Schaufler
- [PATCH v5 19/38] capability: Initialize as LSM_ORDER_FIRST, Casey Schaufler
- [PATCH v5 20/38] procfs: add smack subdir to attrs, Casey Schaufler
- [PATCH v5 25/38] AppArmor: Abstract use of cred security blob, Casey Schaufler
- [PATCH v5 26/38] TOMOYO: Abstract use of cred security blob, Casey Schaufler
- [PATCH v5 27/38] Infrastructure management of the cred security blob, Casey Schaufler
- [PATCH v5 30/38] LSM: Infrastructure management of the file security, Casey Schaufler
- [PATCH v5 31/38] SELinux: Abstract use of inode security blob, Casey Schaufler
- [PATCH v5 34/38] LSM: Infrastructure management of the task security, Casey Schaufler
- [PATCH v5 32/38] Smack: Abstract use of inode security blob, Casey Schaufler
- [PATCH v5 35/38] SELinux: Abstract use of ipc security blobs, Casey Schaufler
- [PATCH v5 33/38] LSM: Infrastructure management of the inode security, Casey Schaufler
- [PATCH v5 15/38] LSM: Split LSM preparation from initialization, Casey Schaufler
- [PATCH v5 36/38] Smack: Abstract use of ipc security blobs, Casey Schaufler
- [PATCH v5 37/38] LSM: Infrastructure management of the ipc security blob, Casey Schaufler
- [PATCH v5 38/38] TOMOYO: Update LSM flags to no longer be exclusive, Casey Schaufler
- [PATCH v5 28/38] SELinux: Abstract use of file security blob, Casey Schaufler
- [PATCH v5 01/38] LSM: Introduce LSM_FLAG_LEGACY_MAJOR, Casey Schaufler
- [PATCH v5 09/38] LSM: Prepare for reorganizing "security=" logic, Casey Schaufler
- [PATCH v5 03/38] LSM: Plumb visibility into optional "enabled" state, Casey Schaufler
- [PATCH v5 24/38] SELinux: Remove unused selinux_is_enabled, Casey Schaufler
- [PATCH v5 29/38] Smack: Abstract use of file security blob, Casey Schaufler
- [PATCH v5 17/38] Yama: Initialize as ordered LSM, Casey Schaufler
- [PATCH v5 02/38] LSM: Provide separate ordered initialization, Casey Schaufler
- [PATCH v5 04/38] LSM: Lift LSM selection out of individual LSMs, Casey Schaufler
- [PATCH v5 06/38] LSM: Introduce CONFIG_LSM, Casey Schaufler
- [PATCH v5 08/38] LSM: Tie enabling logic to presence in ordered list, Casey Schaufler
- [PATCH v5 05/38] LSM: Build ordered list of LSMs to initialize, Casey Schaufler
- [PATCH v5 10/38] LSM: Refactor "security=" in terms of enable/disable, Casey Schaufler
- [PATCH v5 23/38] SELinux: Remove cred security blob poisoning, Casey Schaufler
- [PATCH v5 22/38] SELinux: Abstract use of cred security blob, Casey Schaufler
- [PATCH v5 21/38] Smack: Abstract use of cred security blob, Casey Schaufler
- Message not available
<Possible follow-ups>
[PATCH v5 00/38] LSM: Module stacking for SARA and Landlock, Casey Schaufler
- [PATCH v5 01/38] LSM: Introduce LSM_FLAG_LEGACY_MAJOR, Casey Schaufler
- [PATCH v5 21/38] Smack: Abstract use of cred security blob, Casey Schaufler
- [PATCH v5 20/38] procfs: add smack subdir to attrs, Casey Schaufler
- [PATCH v5 29/38] Smack: Abstract use of file security blob, Casey Schaufler
- [PATCH v5 37/38] LSM: Infrastructure management of the ipc security blob, Casey Schaufler
- [PATCH v5 33/38] LSM: Infrastructure management of the inode security, Casey Schaufler
- [PATCH v5 36/38] Smack: Abstract use of ipc security blobs, Casey Schaufler
- [PATCH v5 35/38] SELinux: Abstract use of ipc security blobs, Casey Schaufler
- [PATCH v5 34/38] LSM: Infrastructure management of the task security, Casey Schaufler
- [PATCH v5 30/38] LSM: Infrastructure management of the file security, Casey Schaufler
- [PATCH v5 32/38] Smack: Abstract use of inode security blob, Casey Schaufler
- [PATCH v5 31/38] SELinux: Abstract use of inode security blob, Casey Schaufler
- [PATCH v5 28/38] SELinux: Abstract use of file security blob, Casey Schaufler
- [PATCH v5 24/38] SELinux: Remove unused selinux_is_enabled, Casey Schaufler
- [PATCH v5 27/38] Infrastructure management of the cred security blob, Casey Schaufler
- [PATCH v5 26/38] TOMOYO: Abstract use of cred security blob, Casey Schaufler
- [PATCH v5 25/38] AppArmor: Abstract use of cred security blob, Casey Schaufler
- [PATCH v5 22/38] SELinux: Abstract use of cred security blob, Casey Schaufler
- [PATCH v5 23/38] SELinux: Remove cred security blob poisoning, Casey Schaufler
- [PATCH v5 19/38] capability: Initialize as LSM_ORDER_FIRST, Casey Schaufler
- [PATCH v5 16/38] LoadPin: Initialize as ordered LSM, Casey Schaufler
- [PATCH v5 18/38] LSM: Introduce enum lsm_order, Casey Schaufler
- [PATCH v5 17/38] Yama: Initialize as ordered LSM, Casey Schaufler
- [PATCH v5 13/38] selinux: Remove SECURITY_SELINUX_BOOTPARAM_VALUE, Casey Schaufler
- [PATCH v5 11/38] LSM: Separate idea of "major" LSM from "exclusive" LSM, Casey Schaufler
- [PATCH v5 12/38] apparmor: Remove SECURITY_APPARMOR_BOOTPARAM_VALUE, Casey Schaufler
- [PATCH v5 14/38] LSM: Add all exclusive LSMs to ordered initialization, Casey Schaufler
- [PATCH v5 15/38] LSM: Split LSM preparation from initialization, Casey Schaufler
- [PATCH v5 08/38] LSM: Tie enabling logic to presence in ordered list, Casey Schaufler
- [PATCH v5 10/38] LSM: Refactor "security=" in terms of enable/disable, Casey Schaufler
- [PATCH v5 09/38] LSM: Prepare for reorganizing "security=" logic, Casey Schaufler
- [PATCH v5 07/38] LSM: Introduce "lsm=" for boottime LSM selection, Casey Schaufler
- [PATCH v5 05/38] LSM: Build ordered list of LSMs to initialize, Casey Schaufler
- [PATCH v5 04/38] LSM: Lift LSM selection out of individual LSMs, Casey Schaufler
- [PATCH v5 06/38] LSM: Introduce CONFIG_LSM, Casey Schaufler
- [PATCH v5 03/38] LSM: Plumb visibility into optional "enabled" state, Casey Schaufler
- [PATCH v5 02/38] LSM: Provide separate ordered initialization, Casey Schaufler
- [PATCH v5 38/38] TOMOYO: Update LSM flags to no longer be exclusive, Casey Schaufler
[RFC PATCH v2 0/4] Fix ENOMEM errors during policy reload,
Ondrej Mosnacek
Re: linux-next: manual merge of the selinux tree with the vfs tree,
Ondrej Mosnacek
[PATCH] selinux: make "selinux_policycap_names[]" const char *,
Alexey Dobriyan
Re: [PATCH] libsepol: ibpkeys.c: fix printf format string specifiers for subnet_prefix, Nicolas Iooss
[PATCH 1/1] Documentation: Update SELinux reference policy URL,
Petr Vorel
[PATCH] selinux: always allow mounting submounts,
Ondrej Mosnacek
[PATCH] dbus: remove deprecated at_console statement,
Petr Lautrbach
Container SELinux Customization tool - udica, Lukas Vrabec
[GIT PULL] SELinux fixes for v4.20 (#1),
Paul Moore
[PATCH] selinux: fix non-MLS handling in mls_context_to_sid(),
Paul Moore
Kernel panic - not syncing: corrupted stack end detected inside scheduler, Qian Cai
[RFC PATCH 0/3] Fix ENOMEM errors during policy reload,
Ondrej Mosnacek
BUG: KASAN: slab-out-of-bounds in selinux_sctp_bind_connect+0x60/0x150,
Qian Cai
[PATCH v3] selinux: simplify mls_context_to_sid(),
Ondrej Mosnacek
[no subject],
Ravi Kumar
- Re:, Ravi Kumar
- Re:, Ondrej Mosnacek
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]