Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- [PATCH 0/2] show checkreqprot status in sestatus,
Christian Göttsche
- [PATCH 0/2 v2] libsepol and checkpolicy: Add ability to expand some attributes in binary policy,
James Carter
- [PATCH 2/2] sestatus: show checkreqprot status, Christian Göttsche
- [PATCH 1/2] libselinux: add security_checkreqprot,
Christian Göttsche
- [PATCH] selinux: add selinux_is_enforced() function,
Sebastien Buisson
- [PATCH] selinux: add selinux_status_get_seq() function,
Sebastien Buisson
- [PATCH 1/6] libsemanage: make semanage_..._destroy return void,
Nicolas Iooss
- [PATCH v2] libsemanage: Save linked policy, skip re-link when possible, Stephen Smalley
- [PATCH 0/2] libsepol and checkpolicy: Add ability to expand some attributes in binary policy,
James Carter
- [PATCH] libsemanage: Save linked policy, skip re-link when possible, Stephen Smalley
- refpolicy flask generator script,
Christian Göttsche
- [PATCH 1/3] libsepol: do not free attr_name twice,
Nicolas Iooss
- [PATCH 1/2] libsepol: do not seg fault on sepol_*_key_free(NULL),
Stephen Smalley
- [PATCH 1/6] libselinux: do not dereference a NULL pointer when calloc() fails,
Nicolas Iooss
- MLS directory label inheritance rules,
Nick Kralevich
- add CONFIG_SECURITY_SELINUX_LOAD_ONCE,
Nick Kralevich
- [PATCH] policycoreutils/load_policy: Drop is_selinux_enabled() check,
Luis Ressel
- Setting booleans causes duplicate ports in semanage listings, Carlos Rodrigues
- newrole: pam_systemd fails after dbus message rejection,
cgzones
- security_bounded_transition,
cgzones
- Confining a Java process reading file,
Rahmadi Trimananda
- Running Java and JVM on SELinux,
Rahmadi Trimananda
- ssh/cron access checks and my Play Machine,
Russell Coker
- [PATCH] selinux: Fix an uninitialized variable bug,
Dan Carpenter
- userspace object manager confused,
Dominick Grift
- label for /proc directory (before mounting),
Colin Walters
- [PATCH v2] libsepol: In module_to_cil create one attribute for each unique set,
James Carter
- [PATCH] selinux: Fix SBLABEL_MNT for NFS mounts,
Tomeu Vizoso
- [PATCH 1/7] libsepol: do not dereference a NULL pointer when stack_init() fails,
Nicolas Iooss
- [PATCH] libsepol: In module_to_cil create one attribute for each unique set,
James Carter
- [PATCH] selinux: Use task_alloc hook rather than task_create hook,
Tetsuo Handa
- FOSSASIA 2017 SELinux intro talk, Jason Zaman
- [PATCH 1/3] policycoreutils/setfiles: stdout messages don't need program prefix,
Alan Jenkins
- [PATCH 1/2] policycoreutils: fixfiles should handle path arguments more robustly,
Alan Jenkins
- [PATCH 1/1] libsepol/cil: do not dereference a NULL pointer when calloc() fails,
Nicolas Iooss
- [PATCH] mcstrans: fix typo in mcstransd.8 man page,
Nikola Forró
- [PATCH] selinux: fix double free in selinux_parse_opts_str(),
Tetsuo Handa
- [ANNOUNCE] Linux Security Summit 2017 - CFP, James Morris
- [PATCH 0/3 v3] libsepol and checkpolicy: Output CIL or policy.conf from kernel policy,
James Carter
- security, hugetlbfs: write to user memory in hugetlbfs_destroy_inode,
Dmitry Vyukov
- security: double-free in superblock_doinit,
Dmitry Vyukov
- [PATCH] libsepol/cil: Add hexadecimal support for Xen ioportcon statements,
James Carter
- net_admin audit for setsockopt SO_SNDBUFFORCE,
cgzones
- [PATCH 0/3 v2] libsepol and checkpolicy: Output CIL or policy.conf from kernel policy,
James Carter
- [PATCH 0/3] libsepol: Allow hexadecimal numbers in Xen context rules,
James Carter
- [PATCH] checkpolicy: Fix minor memory leak in checkpolicy,
James Carter
- [PATCH 1/1] checkpolicy: dereference rangehead after checking it was not NULL,
Nicolas Iooss
- [PATCH 1/1] libsepol/cil: avoid freeing uninitialized values,
Nicolas Iooss
- [PATCH 1/1] libsepol/cil: make reporting conflicting type transitions work,
Nicolas Iooss
- [PATCH] selinux: Remove unnecessary check of array base in selinux_set_mapping(),
Matthias Kaehlcke
- newrole as su'ed root,
cgzones
- portcon in policy modules,
Ian Pilcher
- [PATCH] python/semanage: fix export of fcontext socket entries, Stephen Smalley
- tomcat_t domain behavior,
面和毅
- Re: Bug#857660: SELinux: cannot sent policyload notice,
cgzones
- [PATCH 0/3] libsepol and checkpolicy: Output CIL or policy.conf from kernel policy,
James Carter
- [PATCH] Python 3.6 invalid escape sequence deprecation fixes,
Ville Skyttä
- Custom Process Label (SElinux),
Kashif ali
- [PATCH v2] selinux: check for address length in selinux_socket_bind(),
Alexander Potapenko
- Fwd: Kernel repository updated to v4.11-rc1, Paul Moore
- [PATCH 1/6] restorecond: add noreturn attribute to exitApp(),
Nicolas Iooss
- [PATCH 1/1] selinux: include sys/socket.h in host programs to have PF_MAX,
Nicolas Iooss
- [PATCH] selinux: check for address length in selinux_socket_bind(),
Alexander Potapenko
- [PATCH] python/sepolicy: fix obtaining domain name in HTMLManPages,
Vit Mojzis
- [PATCH] selinux-testsuite: capable_file: Add dac_override and dac_read_search tests, Stephen Smalley
- seapply - alternative to semanage for configuration management,
Doug Brown
- Securing a service written in Python,
Ian Pilcher
- SELinux type transition rule not working,
Ian Pilcher
- [GIT PULL] SELinux fixes for 4.11 (#1), Paul Moore
- [PATCH] libsepol: Define cgroup_seclabel policy capability, Stephen Smalley
- [PATCH] selinux: wrap cgroup seclabel support with its own policy capability,
Stephen Smalley
- selinux transition rules,
RM-IT R.Mielnik
[PATCH] selinux: fix kernel BUG on prlimit(..., NULL, NULL),
Stephen Smalley
[PATCH 1/6] semodule_package: do not leak memory when using -u or -s,
Nicolas Iooss
strange audit2allow error, Russell Coker
Support for multiple types in typeattribute,
Alex Klyubin
[RFC v2 PATCH 2/2] kernel: Add SELinux SCTP protocol support,
Richard Haines
[RFC v2 PATCH 1/2] kernel: Add LSM hooks for SCTP support, Richard Haines
[RFC v2 PATCH 0/2] kernel: Add SELinux SCTP protocol support, Richard Haines
[PATCH] libselinux: allow link with -lfts,
Natanael Copa
[PATCH] sepolgen: strip non-printable characters when parsing audit messages,
Vit Mojzis
[RFC 4/7] selinux: mark __ro_mostly_after_init for selinux_hooks/selinux_nf_ops,
Hoeun Ryu
[PATCH 1/1] libselinux, libsemanage: make PYPREFIX computation more robust,
Nicolas Iooss
[PATCH 1/5] libsepol/cil: use __cil_ordered_lists_destroy() to free unordered_classorder_lists,
Nicolas Iooss
[PATCH] fs: switch order of CAP_DAC_OVERRIDE and CAP_DAC_READ_SEARCH checks,
Stephen Smalley
[PATCH] timerfd: only check CAP_WAKE_ALARM when it is needed, Stephen Smalley
[PATCH v2] prlimit,security,selinux: add a security hook for prlimit, Stephen Smalley
[PATCH 0/2] selinux-testsuite: fixes for RHEL7.3,
Stephen Smalley
[PATCH] prlimit,security,selinux: add a security hook for prlimit,
Stephen Smalley
[RFC v2 PATCH 2/2] security: mark LSM hooks as __ro_after_init,
James Morris
[RFC v2 PATCH 1/2] security: introduce CONFIG_SECURITY_WRITABLE_HOOKS,
James Morris
[RFC v2 PATCH 0/2] security: mark LSM hooks with __ro_after_init,
James Morris
[PATCH] libsemanage: Perform access check using euid instead of uid,
Vit Mojzis
Re: [RFC PATCH 4/4] selinux: constify nlmsg permission tables,
Paul Moore
[PATCH] selinux-testsuite: Add tests for prlimit(2) permission checks, Stephen Smalley
[RFC] prlimit,security,selinux: add a security hook for prlimit,
Stephen Smalley
[GIT PULL] SELinux patches for 4.11,
Paul Moore
[PATCH] selinux-testsuite: allow netlink test domains to load kernel modules, Paul Moore
[PATCH] security: selinux: allow per-file labeling for cgroupfs,
Antonio Murdaca
[PATCH] libsepol/cil: Destroy cil_tree_node stacks when finished resolving AST,
James Carter
[GIT PULL] SELinux fixes for 4.10 (#2), Paul Moore
SELinux help, Anpu Ann mathews
[PATCH] selinux-testsuite: add tests for new netlink socket classes, Stephen Smalley
[PATCH] selinux-testsuite: fix ptrace test script, Stephen Smalley
Still having problems with typebounds check.,
Daniel J Walsh
[PATCH 1/8] libsepol: fix -Wwrite-strings warnings,
Nicolas Iooss
[PATCH 1/1] libsepol/cil: fix type confusion in cil_copy_ast,
Nicolas Iooss
[PATCH 1/1] Introduce Travis-CI tests,
Nicolas Iooss
openshift label issue, Kashif ali
possible regression in "semanage user",
Vit Mojzis
[PATCH v2] security: selinux: allow changing labels for cgroupfs,
Antonio Murdaca
[PATCH] security: selinux: allow changing labels for cgroupfs,
Antonio Murdaca
[PATCH] libselinux: do not rely on non-POSIX behavior for write(), Stephen Smalley
[PATCH 0/2] checkpolicy & libsepol: process declarations and requirements,
James Carter
[PATCH] checkpolicy: Improve check for identifier flavor mismatch, James Carter
[PATCH 0/5] checkpolicy: Cleanup declare and require functions,
James Carter
[PATCH] selinux: fix off-by-one in setprocattr,
Stephen Smalley
[PATCH] policycoreutils: remove deprecated -o option from fixfiles verify, Stephen Smalley
[PATCH] setfiles: Fix setfiles progress indicator,
Richard Haines
Where to troubleshoot and ask questions?,
Bassam Alsanie
CIL Typepermissive Symbol not inside parenthesis,
Roberts, William C
[PATCH] libselinux: selinux_restorecon.3 man page typo fix,
Lokesh Mandvekar
Patch for typo fix,
Lokesh Mandvekar
dpkg: run maintainer scripts with SELinux user system_u,
cgzones
pam_selinux: add new option to select from default_contexts,
cgzones
[PATCH] libsepol: fix pp module to cil nodecon statement,
Steve Lawrence
[PATCH] libselinux/src/regex.c: support old compilers for the endian check,
Thomas Petazzoni
strange avc,
Russell Coker
[PATCH] libselinux: disable filespec hash table stats on non-debug builds,
Stephen Smalley
[PATCH] policycoreutils/setfiles: set up a logging callback for libselinux,
Stephen Smalley
Re: selinux post, Alan Jenkins
ANN: SETools 4.1.0, Chris PeBenito
[PATCH] policycoreutils: let output of `fixfiles` be redirected (as normal),
Alan Jenkins
[PATCH 0/4] Make xfrm usable by 32-bit programs,
Kevin Cernekee
NFS mount contexts,
Russell Coker
[PATCH 1/4] checkpolicy: always free id in define_type(),
Nicolas Iooss
[PATCH] libsepol compilation fixes for macOS.,
Karl MacMillan
ANN: V3SPA 2.1.1, Robert Gove
[PATCH] policycoreutils/hll/pp: Fix pp crash when processing base module,
Vit Mojzis
[PATCH] checkpolicy: Fix bug in handling type declaration in optional block.,
James Carter
[PATCH] Compilation fixes for macOS,
Karl MacMillan
Has anyone ever looked into adding labeling support for the cgroup file system,
Daniel J Walsh
[PATCH 00/46] SELinux: Fine-tuning for several function implementations,
SF Markus Elfring
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]