Security Enhanced Linux (SELINUX)
[Prev Page][Next Page]
- ANN: a new release of The SELinux Notebook, Paul Moore
- [PATCH] notebook: make use of "allowlist" instead of "whitelist", Paul Moore
- [PATCH] notebook: fix broken sepgsql.googlecode.com URL, Paul Moore
- Re: memory leak in inet_create,
Willy Tarreau
- [PATCH] sepolicy: fix a spelling mistake,
kkz
- [RFC PATCH 0/9] Add CIL Deny Rule,
James Carter
- [RFC PATCH 2/9] libsepol/cil: Add cil_list_is_empty macro, James Carter
- [RFC PATCH 1/9] libsepol/cil: Parse and add deny rule to AST, but do not process, James Carter
- [RFC PATCH 6/9] libsepol: Export the cil_write_post_ast function, James Carter
- [RFC PATCH 9/9] secilc/docs: Add deny rule to CIL documentation, James Carter
- [RFC PATCH 3/9] libsepol/cil: Add cil_tree_remove_node function, James Carter
- [RFC PATCH 7/9] secilc/secil2tree: Add option to write CIL AST after post processing, James Carter
- [RFC PATCH 4/9] libsepol/cil: Process deny rules, James Carter
- [RFC PATCH 8/9] secilc/test: Add a deny rule test, James Carter
- [RFC PATCH 5/9] libsepol/cil: Add cil_write_post_ast function, James Carter
- Re: [RFC PATCH 0/9] Add CIL Deny Rule, Daniel Burgener
- [PATCH 0/2] lsm: introduce and use security_mptcp_add_subflow(),
Paolo Abeni
- [PATCH 0/1][RFC] SELINUX: Remove obsolete deferred inode security,
Alexander Kozhevnikov
- [GIT PULL] SELinux patches for v6.2,
Paul Moore
- [PATCH] sepolicy: Call os.makedirs() with exist_ok=True,
Petr Lautrbach
- BUG: selinux-testsuite failures in tests/cap_userns,
Paul Moore
- [PATCH testsuite] policy: allow user_namespace::create where appropriate,
Ondrej Mosnacek
- [RFC] IMA LSM based rule race condition issue on 4.19 LTS,
Guozihua (Scott)
- [PATCH 1/2] sepolicy: Switch main selection menu to GtkPopover,
Petr Lautrbach
- [PATCH testsuite 0/4] Bump Fedora versions in CI,
Ondrej Mosnacek
- [PATCH mptcp-net] mptcp: fix LSM labeling for passive msk,
Paolo Abeni
- Intent to release SELinux userspace 3.5-rc1,
Jason Zaman
- [PATCH 1/3] libselinux: fix potential NULL reference and memory leak in audit2why,
Jie Lu
- [PATCH security-next] selinux: use sysfs_emit() to instead of scnprintf(),
ye.xingchen
- Broken SELinux/LSM labeling with MPTCP and accept(2),
Ondrej Mosnacek
- [PATCH v7 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes,
Roberto Sassu
- ANN/RFC: SELinux Reference Policy 3 pre-alpha, Chris PeBenito
- [PATCH v2] Use `pip install` instead of `setup.py install`,
Petr Lautrbach
- [PATCH] libselinux:add check for malloc,
Jie Lu
- semanage export does not distinguish between --modify and --add, Vit Mojzis
- [RFC PATCH v4 0/6] not-self neverallow support,
Christian Göttsche
- [PATCH 1/2] checkpolicy: Improve error message for type bounds,
Vit Mojzis
- secilc genfscon parsing error,
Matthew Sheets
- [PATCH v6 0/6] evm: Do HMAC of multiple per LSM xattrs for new inodes,
Roberto Sassu
- [PATCH v5 0/6] evm: Prepare for moving to the LSM infrastructure,
Roberto Sassu
- [RFC PATCH] Use `pip install` instead of `setup.py install`,
Petr Lautrbach
- Kernel Panic while accessing avtab_search_node,
Jaihind Yadav (QUIC)
- [PATCH v2] libselinux: fix some memory issues in db_init,
Jie Lu
- [PATCH] libselinux: fix some memory issues in db_init,
Jie Lu
- [PATCH] Fix E275 missing whitespace after keyword,
Petr Lautrbach
- [PATCH v3 1/3] python/sepolicy: Fix sepolicy manpage -w ...,
Petr Lautrbach
- New SELinux Notebook release?, Paul Moore
- [PATCH v2 1/3] python/sepolicy: Fix sepolicy manpage -w ...,
Petr Lautrbach
- [PATCH] libselinux: fix memory leaks on the audit2why module init,
Jie Lu
- [RFC PATCH 1/6] libsepol: rename struct member,
Christian Göttsche
- [PATCH 1/2] libsepol/tests: use more strict compiler options,
Christian Göttsche
- [PATCH] [RFC] SELINUX: Remove obsolete deferred inode security init list.,
Konstantin Meskhidze
[PATCH v4 0/5] evm: Prepare for moving to the LSM infrastructure,
Roberto Sassu
[PATCH] libselinux: drop set but not used internal variable,
Christian Göttsche
[PATCH 1/3] libselinux: simplify string copying,
Christian Göttsche
[PATCH 1/3] libselinux: make use of strndup,
Christian Göttsche
[PATCH v2] python: Fix typo in audit2allow.1 example,
Petr Lautrbach
[PATCH] selinux: remove the sidtab context conversion indirect calls,
Paul Moore
[PATCH] python: Fix typo in audit2allow.1 example,
Petr Lautrbach
[PATCH v1 0/2] Add LSM access controls for io_uring_setup,
Gil Cukierman
[PATCH v2] fixfiles: Unmount temporary bind mounts on SIGINT,
Petr Lautrbach
Constraints of policy identifiers,
Christian Göttsche
Security context of root inode of in-memory filesystems, Christian Göttsche
[PATCH 0/5 v3] Remove dependency on the Python module distutils,
James Carter
[PATCH v2] fs: don't audit the capability check in simple_xattr_list(),
Ondrej Mosnacek
[PATCH 0/5 v2] Remove dependency on the Python module distutils,
James Carter
ANN: Reference Policy 2.20221101, Chris PeBenito
[PATCH] libselinux: Ignore missing directories when -i is used,
Vit Mojzis
[PATCH 0/5] Remove dependency on the Python module distutils,
James Carter
[PATCH] libselinux: Drop '\n' from avc_log() messages,
Petr Lautrbach
[PATCH 5.15 135/530] selinux: use "grep -E" instead of "egrep", Greg Kroah-Hartman
[PATCH 4.14 080/210] selinux: use "grep -E" instead of "egrep", Greg Kroah-Hartman
[PATCH 5.10 091/390] selinux: use "grep -E" instead of "egrep", Greg Kroah-Hartman
[PATCH 5.4 057/255] selinux: use "grep -E" instead of "egrep", Greg Kroah-Hartman
[PATCH 4.19 069/229] selinux: use "grep -E" instead of "egrep", Greg Kroah-Hartman
[PATCH 4.9 063/159] selinux: use "grep -E" instead of "egrep", Greg Kroah-Hartman
[PATCH] libselinux: ignore invalid class name lookup,
Thiébaud Weksteen
[PATCH 5.19 176/717] selinux: use "grep -E" instead of "egrep", Greg Kroah-Hartman
[GIT PULL] SELinux fixes for v6.1 (#1),
Paul Moore
[PATCH] python: Do not query the local database if the fcontext is non-local,
James Carter
[PATCH 6.0 202/862] selinux: use "grep -E" instead of "egrep", Greg Kroah-Hartman
[PATCH v2] selinux: use GFP_ATOMIC in convert_context(),
GONG, Ruiqi
[PATCH] python: Harden tools against "rogue" modules,
Vit Mojzis
[PATCH] selinux: use GFP_ATOMIC in convert_context(),
GONG, Ruiqi
[PATCH v5 10/30] selinux: implement get, set and remove acl hook, Christian Brauner
[PATCH V2] docs: Add GPG fingerprints,
James Carter
[PATCH] docs: Add GPG fingerprints,
James Carter
[PATCH 1/2] sandbox: Do not try to remove tmpdir twice if uid == 0,
Petr Lautrbach
[PATCH] libsepol/cil: restore error on context rule conflicts,
Christian Göttsche
[DPKG PATCH] selinux: install log callback to filter messages,
Christian Göttsche
[PATCH] gui: Fix export file chooser dialog,
Petr Lautrbach
[PATCH] libselinux: Add missing '\n' to avc_log() messages,
Petr Lautrbach
[PATCH] lsm: make security_socket_getpeersec_stream() sockptr_t safe,
Paul Moore
systemd socket activation selinux context pr review,
Ted Toth
unnecessary log output in selinux_status_updated,
Petr Lautrbach
Re: [PATCH] Fix race condition when exec'ing setuid files,
Kees Cook
[PATCH 0/2] fs/exec: Explicitly unshare fs_struct on exec,
Kees Cook
SO_PEERSEC protections in sk_getsockopt()?,
Paul Moore
[GIT PULL] SELinux patches for v6.1,
Paul Moore
[PATCH v3] docs: update the README.md with a basic SELinux description,
Paul Moore
[PATCH =v2] docs: update the README.md with a basic SELinux description,
Paul Moore
[PATCH] docs: provide a top level LICENSE file,
Paul Moore
[PATCH] docs: update the README.md with a basic SELinux description,
Paul Moore
bug report: semodule doesn't reject policices with duplicate fc's, Petr Lautrbach
[PATCH v4 10/30] selinux: implement get, set and remove acl hook,
Christian Brauner
[PATCH v3 10/29] selinux: implement get, set and remove acl hook, Christian Brauner
GREETIPNGS REAR BELOVED, Mrs Aisha Gaddafi
[PATCH v38 00/39] LSM: Module stacking for AppArmor,
Casey Schaufler
- [PATCH v38 02/39] LSM: Add an LSM identifier for external use, Casey Schaufler
- [PATCH v38 01/39] LSM: Identify modules by more than name, Casey Schaufler
- [PATCH v38 05/39] proc: Use lsmids instead of lsm names for attrs, Casey Schaufler
- [PATCH v38 03/39] LSM: Identify the process attributes for each module, Casey Schaufler
- [PATCH v38 04/39] LSM: Maintain a table of LSM attribute data, Casey Schaufler
- [PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes, Casey Schaufler
- [PATCH v38 07/39] integrity: disassociate ima_filter_rule from security_audit_rule, Casey Schaufler
- [PATCH v38 08/39] LSM: Infrastructure management of the sock security, Casey Schaufler
- [PATCH v38 09/39] LSM: Add the lsmblob data structure., Casey Schaufler
- [PATCH v38 10/39] LSM: provide lsm name and id slot mappings, Casey Schaufler
- [PATCH v38 11/39] IMA: avoid label collisions with stacked LSMs, Casey Schaufler
- [PATCH v38 14/39] LSM: Use lsmblob in security_secctx_to_secid, Casey Schaufler
- [PATCH v38 12/39] LSM: Use lsmblob in security_audit_rule_match, Casey Schaufler
- [PATCH v38 13/39] LSM: Use lsmblob in security_kernel_act_as, Casey Schaufler
- [PATCH v38 16/39] LSM: Use lsmblob in security_ipc_getsecid, Casey Schaufler
- [PATCH v38 17/39] LSM: Use lsmblob in security_current_getsecid, Casey Schaufler
- [PATCH v38 15/39] LSM: Use lsmblob in security_secid_to_secctx, Casey Schaufler
- [PATCH v38 23/39] LSM: Use lsmcontext in security_inode_getsecctx, Casey Schaufler
- [PATCH v38 20/39] LSM: Specify which LSM to display, Casey Schaufler
- [PATCH v38 19/39] LSM: Use lsmblob in security_cred_getsecid, Casey Schaufler
- [PATCH v38 18/39] LSM: Use lsmblob in security_inode_getsecid, Casey Schaufler
- [PATCH v38 21/39] LSM: Ensure the correct LSM context releaser, Casey Schaufler
- [PATCH v38 22/39] LSM: Use lsmcontext in security_secid_to_secctx, Casey Schaufler
- [PATCH v38 24/39] Use lsmcontext in security_dentry_init_security, Casey Schaufler
- [PATCH v38 25/39] LSM: security_secid_to_secctx in netlink netfilter, Casey Schaufler
- [PATCH v38 26/39] NET: Store LSM netlabel data in a lsmblob, Casey Schaufler
- [PATCH v38 27/39] binder: Pass LSM identifier for confirmation, Casey Schaufler
- [PATCH v38 30/39] Audit: Create audit_stamp structure, Casey Schaufler
- [PATCH v38 31/39] LSM: Add a function to report multiple LSMs, Casey Schaufler
- [PATCH v38 29/39] Audit: Keep multiple LSM data in audit_names, Casey Schaufler
- [PATCH v38 28/39] LSM: security_secid_to_secctx module selection, Casey Schaufler
- [PATCH v38 32/39] Audit: Allow multiple records in an audit_buffer, Casey Schaufler
- [PATCH v38 34/39] audit: multiple subject lsm values for netlabel, Casey Schaufler
- [PATCH v38 36/39] netlabel: Use a struct lsmblob in audit data, Casey Schaufler
- [PATCH v38 35/39] Audit: Add record for multiple object contexts, Casey Schaufler
- [PATCH v38 37/39] LSM: Removed scaffolding function lsmcontext_init, Casey Schaufler
- [PATCH v38 33/39] Audit: Add record for multiple task security contexts, Casey Schaufler
- [PATCH v38 38/39] AppArmor: Remove the exclusive flag, Casey Schaufler
- [PATCH v38 39/39] LSM: Create lsm_module_list system call, Casey Schaufler
[PATCH v2 11/30] selinux: implement set acl hook,
Christian Brauner
[RFC PATCH] selinux: increase the deprecation sleep for checkreqprot and runtime disable,
Paul Moore
[PATCH] docs: add Paul Moore's GPG fingerprint,
Paul Moore
[PATCH] libsemanage: Allow user to set SYSCONFDIR,
Matt Sheets
[PATCH 10/29] selinux: implement set acl hook,
Christian Brauner
[PATCH 0/1] Add CONFIG_SECURITY_SELINUX_PERMISSIVE_DONTAUDIT,
jeffxu
[PATCH] selinux: remove runtime disable message in the install_policy.sh script,
Paul Moore
[PATCH] scripts/selinux: use "grep -E" instead of "egrep",
Greg Kroah-Hartman
[PATCH] secilc/doc: classmap is also allowed in permissionx,
Dominick Grift
[PATCH userspace] fixfiles: do not cross mounts when traversing directories,
Ondrej Mosnacek
/dev/random MLS policy,
Ted Toth
[PATCH] fixfiles: Unmount temporary bind mounts on SIGINT,
Petr Lautrbach
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Fedora Desktop]
[Kernel]
[KDE Users]
[Gnome Users]