summaryrefslogtreecommitdiff
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* exec: Always set cap_ambient in cap_bprm_set_credsEric W. Biederman2020-06-031-0/+1
* evm: Check also if *tfm is an error pointer in init_desc()Roberto Sassu2020-05-271-1/+1
* selinux: properly handle multiple messages in selinux_netlink_send()Paul Moore2020-05-051-24/+45
* KEYS: reaching the keys quotas correctlyYang Xu2020-04-242-3/+3
* selinux: ensure we cleanup the internal AVC counters on error in avc_update()Jaihind Yadav2020-02-281-1/+1
* apparmor: fix module parameters can be changed after policy is lockedJohn Johansen2019-11-253-13/+29
* apparmor: fix update the mtime of the profile file on replacementJohn Johansen2019-11-251-0/+2
* apparmor: fix uninitialized lsm_audit memberJohn Johansen2019-11-252-2/+4
* ima: always return negative code for errorSascha Hauer2019-10-171-1/+4
* smack: use GFP_NOFS while holding inode_smack::smk_lockEric Biggers2019-10-072-3/+3
* Smack: Don't ignore other bprm->unsafe flags if LSM_UNSAFE_PTRACE is setJann Horn2019-10-071-1/+2
* security: smack: Fix possible null-pointer dereferences in smack_socket_sock_...Jia-Ju Bai2019-10-071-0/+2
* keys: Fix missing null pointer check in request_key_auth_describe()Hillf Danton2019-09-211-0/+6
* selinux: fix memory leak in policydb_init()Ondrej Mosnacek2019-08-061-1/+5
* apparmor: enforce nullbyte at end of tag stringJann Horn2019-07-101-1/+1
* selinux: never allow relabeling on context mountsOndrej Mosnacek2019-05-161-9/+31
* device_cgroup: fix RCU imbalance in error caseJann Horn2019-04-271-1/+1
* missing barriers in some of unix_sock ->addr and ->path accessesAl Viro2019-03-231-4/+6
* KEYS: restrict /proc/keys by credentials at open timeEric Biggers2019-03-231-6/+2
* KEYS: always initialize keyring_index_key::desc_lenEric Biggers2019-03-234-6/+4
* KEYS: allow reaching the keys quotas exactlyEric Biggers2019-03-231-2/+2
* smack: fix access permissions for keyringZoran Markovic2019-02-201-3/+9
* selinux: fix GPF on invalid policyStephen Smalley2019-01-261-1/+2
* LSM: Check for NULL cred-security on freeJames Morris2019-01-261-0/+7
* Yama: Check for pid death before checking ancestryKees Cook2019-01-261-1/+3
* mm: replace get_user_pages() write/force parameters with gup_flagsLorenzo Stoakes2018-12-171-1/+2
* ima: fix showing large 'violations' or 'runtime_measurements_count'Eric Biggers2018-11-211-3/+3
* KEYS: put keyring if install_session_keyring_to_cred() failsEric Biggers2018-11-101-3/+4
* selinux: use GFP_NOWAIT in the AVC kmem_cachesMichal Hocko2018-09-191-8/+6
* Smack: Mark inode instant in smack_task_to_inodeCasey Schaufler2018-08-241-0/+1
* selinux: KASAN: slab-out-of-bounds in xattr_getsecuritySachin Grover2018-06-061-1/+1
* Revert "ima: limit file hash setting by user to fix and log modes"Mimi Zohar2018-06-061-6/+2
* ima: Fallback to the builtin hash algorithmPetr Vorel2018-05-302-0/+15
* ima: Fix Kconfig to select TPM 2.0 CRB interfaceJiandi An2018-05-301-0/+1
* selinux: do not check open permission on socketsStephen Smalley2018-04-131-3/+7
* selinux: Remove redundant check for unknown labeling behaviorMatthias Kaehlcke2018-04-081-16/+0
* selinux: Remove unnecessary check of array base in selinux_set_mapping()Matthias Kaehlcke2018-04-081-1/+1
* ima: relax requiring a file signature for new files with zero lengthMimi Zohar2018-03-221-1/+2
* apparmor: Make path_max parameter readonlyJohn Johansen2018-03-221-1/+1
* selinux: check for address length in selinux_socket_bind()Alexander Potapenko2018-03-221-0/+8
* selinux: skip bounded transition processing if the policy isn't loadedPaul Moore2018-02-251-0/+3
* selinux: ensure the context is NUL terminated in security_context_to_sid_core()Paul Moore2018-02-251-10/+8
* KEYS: encrypted: fix buffer overread in valid_master_desc()Eric Biggers2018-02-161-16/+15
* selinux: general protection fault in sock_has_permMark Salyzyn2018-02-031-0/+2
* KPTI: Rename to PAGE_TABLE_ISOLATIONKees Cook2018-01-051-1/+1
* x86/kaiser: Reenable PARAVIRTBorislav Petkov2018-01-051-1/+1
* kaiser: delete KAISER_REAL_SWITCH optionHugh Dickins2018-01-051-4/+0
* kaiser: KAISER depends on SMPHugh Dickins2018-01-051-4/+6
* kaiser: merged updateDave Hansen2018-01-051-0/+5
* KAISER: Kernel Address IsolationRichard Fellner2018-01-051-0/+7