summaryrefslogtreecommitdiff
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* selinux: use GFP_NOWAIT in the AVC kmem_cachesMichal Hocko2018-09-191-8/+6
* Smack: Mark inode instant in smack_task_to_inodeCasey Schaufler2018-08-241-0/+1
* selinux: KASAN: slab-out-of-bounds in xattr_getsecuritySachin Grover2018-06-061-1/+1
* Revert "ima: limit file hash setting by user to fix and log modes"Mimi Zohar2018-06-061-6/+2
* ima: Fallback to the builtin hash algorithmPetr Vorel2018-05-302-0/+15
* ima: Fix Kconfig to select TPM 2.0 CRB interfaceJiandi An2018-05-301-0/+1
* selinux: do not check open permission on socketsStephen Smalley2018-04-131-3/+7
* selinux: Remove redundant check for unknown labeling behaviorMatthias Kaehlcke2018-04-081-16/+0
* selinux: Remove unnecessary check of array base in selinux_set_mapping()Matthias Kaehlcke2018-04-081-1/+1
* ima: relax requiring a file signature for new files with zero lengthMimi Zohar2018-03-221-1/+2
* apparmor: Make path_max parameter readonlyJohn Johansen2018-03-221-1/+1
* selinux: check for address length in selinux_socket_bind()Alexander Potapenko2018-03-221-0/+8
* selinux: skip bounded transition processing if the policy isn't loadedPaul Moore2018-02-251-0/+3
* selinux: ensure the context is NUL terminated in security_context_to_sid_core()Paul Moore2018-02-251-10/+8
* KEYS: encrypted: fix buffer overread in valid_master_desc()Eric Biggers2018-02-161-16/+15
* selinux: general protection fault in sock_has_permMark Salyzyn2018-02-031-0/+2
* KPTI: Rename to PAGE_TABLE_ISOLATIONKees Cook2018-01-051-1/+1
* x86/kaiser: Reenable PARAVIRTBorislav Petkov2018-01-051-1/+1
* kaiser: delete KAISER_REAL_SWITCH optionHugh Dickins2018-01-051-4/+0
* kaiser: KAISER depends on SMPHugh Dickins2018-01-051-4/+6
* kaiser: merged updateDave Hansen2018-01-051-0/+5
* KAISER: Kernel Address IsolationRichard Fellner2018-01-051-0/+7
* KEYS: add missing permission check for request_key() destinationEric Biggers2017-12-201-10/+38
* ima: fix hash algorithm initializationBoshi Wang2017-12-091-0/+4
* ima: do not update security.ima if appraisal status is not INTEGRITY_PASSRoberto Sassu2017-11-241-0/+3
* security/keys: add CONFIG_KEYS_COMPAT to KconfigBilal Amarni2017-11-181-0/+4
* KEYS: trusted: fix writing past end of buffer in trusted_read()Eric Biggers2017-11-151-11/+12
* KEYS: trusted: sanitize all key materialEric Biggers2017-11-151-28/+22
* KEYS: return full count in keyring_read() if buffer is too smallEric Biggers2017-11-081-20/+19
* KEYS: Fix race between updating and finding a negative keyDavid Howells2017-10-2712-39/+49
* KEYS: don't let add_key() update an uninstantiated keyDavid Howells2017-10-271-0/+10
* KEYS: encrypted: fix dereference of NULL user_key_payloadEric Biggers2017-10-271-0/+7
* lsm: fix smack_inode_removexattr and xattr_getsecurity memleakCasey Schaufler2017-10-121-30/+25
* KEYS: prevent KEYCTL_READ on negative keyEric Biggers2017-10-051-0/+5
* KEYS: prevent creating a different user's keyringsEric Biggers2017-10-054-12/+23
* KEYS: fix writing past end of user-supplied buffer in keyring_read()Eric Biggers2017-10-051-9/+5
* KEYS: Fix an error code in request_master_key()Dan Carpenter2017-07-151-1/+1
* KEYS: fix freeing uninitialized memory in key_update()Eric Biggers2017-06-141-3/+2
* KEYS: fix dereferencing NULL payload with nonzero lengthEric Biggers2017-06-141-2/+2
* ima: accept previously set IMA_NEW_FILEDaniel Glöckner2017-05-251-2/+3
* KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyringsEric Biggers2017-04-272-24/+31
* KEYS: Change the name of the dead type to ".dead" to prevent user accessDavid Howells2017-04-271-1/+1
* KEYS: Disallow keyrings beginning with '.' to be joined as session keyringsDavid Howells2017-04-271-2/+7
* selinux: fix off-by-one in setprocattrStephen Smalley2017-02-141-1/+1
* apparmor: fix change_hat not finding hat after policy replacementJohn Johansen2016-12-021-2/+4
* KEYS: Fix short sprintf buffer in /proc/keys show functionDavid Howells2016-11-101-1/+1
* ima: use file_dentry()Miklos Szeredi2016-10-162-3/+3
* apparmor: fix ref count leak when profile sha1 hash is readJohn Johansen2016-08-161-0/+1
* KEYS: potential uninitialized variableDan Carpenter2016-07-271-1/+1
* security: let security modules use PTRACE_MODE_* with bitmasksJann Horn2016-03-032-7/+5