December 2017 Archives by subject
Starting: Fri Dec 1 01:55:18 UTC 2017
Ending: Sat Dec 30 23:16:01 UTC 2017
Messages: 214
- [BUG] kernel stack corruption during/after Netlabel error
James Morris
- [GIT PULL] Key subsystem fixes for 4.15
James Morris
- [GIT PULL] KEYS, ASN.1, X.509, PKCS#7: Fixes
David Howells
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Daniel Micay
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
Marcus Meissner
- [Linux-ima-devel] [PATCH 12/12] ima: added Documentation/security/IMA-digest-lists.txt
Ken Goldman
- [Linux-ima-devel] [PATCH 12/12] ima: added Documentation/security/IMA-digest-lists.txt
Roberto Sassu
- [PATCH 0/6] LSM: Infrastructure management of security blobs for stacking
Casey Schaufler
- [PATCH 06/11] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
Serge E. Hallyn
- [PATCH 06/11] capabilities: Allow privileged user in s_user_ns to set security.* xattrs
Dongsu Park
- [PATCH 1/1] genalloc: track beginning of allocations
Igor Stoppa
- [PATCH 1/6] procfs: add smack subdir to attrs
Casey Schaufler
- [PATCH 11/11] evm: Don't update hmacs in user ns mounts
Dongsu Park
- [PATCH 11/11] evm: Don't update hmacs in user ns mounts
Serge E. Hallyn
- [PATCH 11/11] evm: Don't update hmacs in user ns mounts
Mimi Zohar
- [PATCH 11/11] evm: Don't update hmacs in user ns mounts
Mimi Zohar
- [PATCH 2/4] sctp: Add ip option support
Marcelo Ricardo Leitner
- [PATCH 2/4] sctp: Add ip option support
Marcelo Ricardo Leitner
- [PATCH 2/4] sctp: Add ip option support
Paul Moore
- [PATCH 2/4] sctp: Add ip option support
Marcelo Ricardo Leitner
- [PATCH 2/4] sctp: Add ip option support
Paul Moore
- [PATCH 2/4] sctp: Add ip option support
Marcelo Ricardo Leitner
- [PATCH 2/4] sctp: Add ip option support
Paul Moore
- [PATCH 2/6] LSM: Manage credential security blobs
Casey Schaufler
- [PATCH 29/45] security: apparmor: remove duplicate includes
Pravin Shedge
- [PATCH 3/6] LSM: Manage file security blobs
Casey Schaufler
- [PATCH 4/4] selinux: Add SCTP support
Richard Haines
- [PATCH 4/6] LSM: Manage task security blobs
Casey Schaufler
- [PATCH 5/6] LSM: Manage remaining security blobs
Casey Schaufler
- [PATCH 5/9] LSM: Manage remaining security blobs
Tetsuo Handa
- [PATCH 5/9] LSM: Manage remaining security blobs
Casey Schaufler
- [PATCH 6/6] LSM: General stacking
Casey Schaufler
- [PATCH tip/core/rcu 15/21] keyring: Remove now-redundant smp_read_barrier_depends()
Paul E. McKenney
- [PATCH tip/core/rcu 15/21] keyring: Remove now-redundant smp_read_barrier_depends()
James Morris
- [PATCH tip/core/rcu 15/21] keyring: Remove now-redundant smp_read_barrier_depends()
Paul E. McKenney
- [PATCH v2 00/15] ima: digest list feature
Ken Goldman
- [PATCH v2 00/15] ima: digest list feature
Roberto Sassu
- [PATCH v2] ima: Fix warn potential negative subtraction from max
Vasyl Gomonovych
- [PATCH v2] ima: log message to module appraisal error
Bruno E. O. Meneguele
- [PATCH v2] ima: log message to module appraisal error
Joe Perches
- [PATCH v2] ima: log message to module appraisal error
Bruno E. O. Meneguele
- [PATCH V2] selinux: Add SCTP support
Richard Haines
- [PATCH V2] selinux: Add SCTP support
Marcelo Ricardo Leitner
- [PATCH V2] selinux: Add SCTP support
Paul Moore
- [PATCH V2] selinux: Add SCTP support
David Miller
- [PATCH V2] selinux: Add SCTP support
Paul Moore
- [PATCH v2] tpm: Fix the driver cleanup code
Azhar Shaikh
- [PATCH v2] tpm: Fix the driver cleanup code
Jason Gunthorpe
- [PATCH v2] tpm: Fix the driver cleanup code
Jarkko Sakkinen
- [PATCH v2] tpm: Fix the driver cleanup code
Shaikh, Azhar
- [PATCH v2] tpm: Fix the driver cleanup code
Shaikh, Azhar
- [PATCH v3 0/4] Add SELinux SCTP protocol support
Marcelo Ricardo Leitner
- [PATCH v3 1/4] security: Add support for SCTP security hooks
Marcelo Ricardo Leitner
- [PATCH v3 1/4] security: Add support for SCTP security hooks
Casey Schaufler
- [PATCH v3 1/4] security: Add support for SCTP security hooks
Marcelo Ricardo Leitner
- [PATCH v3 1/4] security: Add support for SCTP security hooks
Richard Haines
- [PATCH v3 1/4] security: Add support for SCTP security hooks
Paul Moore
- [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
Matthew Garrett
- [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
Matthew Garrett
- [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
Mimi Zohar
- [PATCH v3 2/4] sctp: Add ip option support
Marcelo Ricardo Leitner
- [PATCH v3 3/4] sctp: Add LSM hooks
Marcelo Ricardo Leitner
- [PATCH v3 4/4] selinux: Add SCTP support
Marcelo Ricardo Leitner
- [PATCH v3] ima: log message to module appraisal error
Bruno E. O. Meneguele
- [PATCH V4 0/4] Add SELinux SCTP protocol support
Richard Haines
- [PATCH V4 1/4] security: Add support for SCTP security hooks
Richard Haines
- [PATCH V4 1/4] security: Add support for SCTP security hooks
Marcelo Ricardo Leitner
- [PATCH V4 2/4] sctp: Add ip option support
Richard Haines
- [PATCH V4 2/4] sctp: Add ip option support
Marcelo Ricardo Leitner
- [PATCH V4 3/4] sctp: Add LSM hooks
Richard Haines
- [PATCH V4 3/4] sctp: Add LSM hooks
Marcelo Ricardo Leitner
- [PATCH V4 4/4] selinux: Add SCTP support
Richard Haines
- [PATCH V4 4/4] selinux: Add SCTP support
Marcelo Ricardo Leitner
- [PATCH v6 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
Jarkko Sakkinen
- [PATCH v6 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
Shaikh, Azhar
- [PATCH v6 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
Azhar Shaikh
- [PATCH v6 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
Jarkko Sakkinen
- [PATCH v6 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
Azhar Shaikh
- [PATCH v6 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
Jarkko Sakkinen
- [PATCH v6 1/2] tpm_tis: Move ilb_base_addr to tpm_tis_data
Azhar Shaikh
- [PATCH v6 2/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
Azhar Shaikh
- [PATCH v7 1/2] tpm_tis: Move ilb_base_addr to tpm_tis_data
Azhar Shaikh
- [PATCH v7 2/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
Azhar Shaikh
- [PATCH] ima: Fix warn potential negative subtraction from max
Vasyl Gomonovych
- [PATCH] ima: Fix warn potential negative subtraction from max
Serge E. Hallyn
- [PATCH] ima: log message to module appraisal error
Bruno E. O. Meneguele
- [PATCH] integrity: get rid of unneeded initializations in integrity_iint_cache entries
Jeff Layton
- [PATCH] integrity: get rid of unneeded initializations in integrity_iint_cache entries
Mimi Zohar
- [PATCH] integrity: get rid of unneeded initializations in integrity_iint_cache entries
Jeff Layton
- [PATCH] security: Export few symbols referred by other modules
Hareesh Gundu
- [PATCH] security: Export few symbols referred by other modules
James Morris
- [PATCH] security: Export few symbols referred by other modules
Tetsuo Handa
- [PATCH] security: Export few symbols referred by other modules
Greg KH
- [PATCH] security: Export few symbols referred by other modules
Hareesh Gundu
- [PATCH] security: Export few symbols referred by other modules
Greg KH
- [PATCH] security: Export few symbols referred by other modules
James Morris
- [PATCH] security: keys: remove redundant assignment to key_ref
Colin King
- [PATCH] security: keys: remove redundant assignment to key_ref
James Morris
- [PATCH] security: keys: remove redundant assignment to key_ref
David Howells
- [PATCH] security: keys: remove redundant assignment to key_ref
Julia Lawall
- [PATCH] security: keys: remove redundant assignment to key_ref
James Morris
- [PATCH] Smack: fix dereferenced before check
Vasyl Gomonovych
- [PATCH] Smack: fix dereferenced before check
Serge E. Hallyn
- [PATCH] Smack: fix dereferenced before check
Casey Schaufler
- [PATCH] tpm: Fix the driver cleanup code
Azhar Shaikh
- [PATCH] tpm: Fix the driver cleanup code
Jason Gunthorpe
- [PATCH] tpm: Fix the driver cleanup code
Shaikh, Azhar
- [PATCH] tpm: Fix the driver cleanup code
Jason Gunthorpe
- [PATCH] tpm: Fix the driver cleanup code
Shaikh, Azhar
- [PATCH] tpm: Fix the driver cleanup code
Jason Gunthorpe
- [PATCH] treewide: remove duplicate includes
Pravin Shedge
- [PATCH] treewide: remove duplicate includes
Luis R. Rodriguez
- [PATCH] treewide: remove duplicate includes
Joe Perches
- [PATCH] treewide: remove duplicate includes
Greg KH
- [PATCH] treewide: remove duplicate includes
Darrick J. Wong
- [PATCH] treewide: remove duplicate includes
Eduardo Valentin
- [PATCH] userns: honour no_new_privs for cap_bset during user ns creation/switch
Maciej Żenczykowski
- [PATCH] userns: honour no_new_privs for cap_bset during user ns creation/switch
Eric W. Biederman
- [PATCH] userns: honour no_new_privs for cap_bset during user ns creation/switch
Maciej Żenczykowski
- [PATCH] userns: honour no_new_privs for cap_bset during user ns creation/switch
Eric W. Biederman
- [PATCH] userns: honour no_new_privs for cap_bset during user ns creation/switch
Maciej Żenczykowski
- [PATCH] userns: honour no_new_privs for cap_bset during user ns creation/switch
Eric W. Biederman
- [PATCH] userns: honour no_new_privs for cap_bset during user ns creation/switch
Eric W. Biederman
- [PATCHv5 1/1] ima: re-introduce own integrity cache lock
Dmitry Kasatkin
- [PATCHv5 1/1] ima: re-introduce own integrity cache lock
Mimi Zohar
- [PATCHv5 1/1] ima: re-introduce own integrity cache lock
Roberto Sassu
- [PATCHv5 1/1] ima: re-introduce own integrity cache lock
Dmitry Kasatkin
- [PATCHv5 1/1] ima: re-introduce own integrity cache lock
Dmitry Kasatkin
- [PATCHv6 1/1] ima: re-introduce own integrity cache lock
Dmitry Kasatkin
- [PATCHv6 1/1] ima: re-introduce own integrity cache lock
Dmitry Kasatkin
- [question] should 363b02dab09b3 be backported to stable 4.1+?
Sergey Senozhatsky
- [question] should 363b02dab09b3 be backported to stable 4.1+?
Eric Biggers
- [question] should 363b02dab09b3 be backported to stable 4.1+?
Sergey Senozhatsky
- [RFC 0/3] Safe, dynamically (un)loadable LSMs
Igor Stoppa
- [RFC 0/3] Safe, dynamically (un)loadable LSMs
Sargun Dhillon
- [RFC 0/3] Safe, dynamically (un)loadable LSMs
Casey Schaufler
- [RFC 0/3] Safe, dynamically (un)loadable LSMs
Sargun Dhillon
- [RFC 0/3] Safe, dynamically (un)loadable LSMs
James Morris
- [RFC 0/3] Safe, dynamically (un)loadable LSMs
Sargun Dhillon
- [RFC PATCH 0/1] genalloc: track beginning of allocations
Igor Stoppa
- [RFC PATCH 2/4] ima: define new ima_sb_post_new_mount hook
Jeff Layton
- [RFC PATCH 2/4] ima: define new ima_sb_post_new_mount hook
Mimi Zohar
- [RFC PATCH 2/4] ima: define new ima_sb_post_new_mount hook
Jeff Layton
- [RFC PATCH 2/4] ima: define new ima_sb_post_new_mount hook
Mimi Zohar
- [RFC PATCH 2/4] ima: define new ima_sb_post_new_mount hook
Jeff Layton
- [RFC PATCH 2/4] ima: define new ima_sb_post_new_mount hook
Jeff Layton
- [RFC v2 0/3] Safe, dynamically loadable LSM
Sargun Dhillon
- [RFC v2 1/3] security: Add safe, dynamic (runtime-loadable) hook support
Tetsuo Handa
- [RFC v2 1/3] security: Add safe, dynamic (runtime-loadable) hook support
Sargun Dhillon
- [RFC v2 1/3] security: Add safe, dynamic (runtime-loadable) hook support
Sargun Dhillon
- [RFC v2 1/3] security: Add safe, dynamic (runtime-loadable) hook support
Casey Schaufler
- [RFC v2 1/3] security: Add safe, dynamic (runtime-loadable) hook support
James Morris
- [RFC v2 1/3] security: Add safe, dynamic (runtime-loadable) hook support
James Morris
- [RFC v2 2/3] LSM: Add statistics about the invocation of dynamic hooks
Casey Schaufler
- [RFC v2 2/3] LSM: Add statistics about the invocation of dynamic hooks
James Morris
- [RFC v2 2/3] LSM: Add statistics about the invocation of dynamic hooks
Sargun Dhillon
- [RFC v2 3/3] LSM: Add an example sample dynamic LSM
Sargun Dhillon
- [RFC][PATCH v2 1/9] ima: pass filename to ima_rdwr_violation_check()
Mimi Zohar
- [RFC][PATCH v2 2/9] ima: preserve flags in ima_inode_post_setattr() if file must be appraised
Mimi Zohar
- [RFC][PATCH v2 3/9] ima: preserve iint flags if security.ima update is successful
Mimi Zohar
- ATTENTION!!!
Loretta Robles
- BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
Paul Moore
- BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
Dmitry Vyukov
- BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
Paul Moore
- BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
Dmitry Vyukov
- BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
Dmitry Vyukov
- BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
Paul Moore
- BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
Paul Moore
- BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
Dmitry Vyukov
- BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
Dmitry Vyukov
- BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
Eric Biggers
- BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
Paul Moore
- BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
Paul Moore
- BUG: unable to handle kernel paging request in security_compute_sid
Eric Biggers
- BUG: unable to handle kernel paging request in security_compute_sid
Dmitry Vyukov
- Differentiating audit rules in an LSM stack
Casey Schaufler
- Differentiating audit rules in an LSM stack
Paul Moore
- Documentation patch for namespaced file capabilities
Michael Kerrisk (man-pages)
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Luis R. Rodriguez
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Alan Cox
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Luis R. Rodriguez
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
Alan Cox
- KASAN: slab-out-of-bounds Read in strcmp
Tetsuo Handa
- KASAN: slab-out-of-bounds Read in strcmp
Tetsuo Handa
- KASAN: slab-out-of-bounds Read in strcmp
James Morris
- KASAN: slab-out-of-bounds Read in strcmp
Dmitry Vyukov
- KASAN: slab-out-of-bounds Read in strcmp
Tetsuo Handa
- KASAN: slab-out-of-bounds Read in strcmp
Tetsuo Handa
- KASAN: slab-out-of-bounds Read in strcmp
Stephen Smalley
- KASAN: slab-out-of-bounds Read in strcmp
Dmitry Vyukov
- KASAN: slab-out-of-bounds Read in strcmp
Paul Moore
- KASAN: slab-out-of-bounds Read in strcmp
Tetsuo Handa
- KASAN: slab-out-of-bounds Read in strcmp
Dmitry Vyukov
- KASAN: slab-out-of-bounds Read in strcmp
Dmitry Vyukov
- KASAN: slab-out-of-bounds Read in strcmp
Stephen Smalley
- KASAN: slab-out-of-bounds Read in strcmp
Paul Moore
- KASAN: slab-out-of-bounds Read in strcmp
Dmitry Vyukov
- KASAN: slab-out-of-bounds Read in strcmp
Dmitry Vyukov
- KASAN: slab-out-of-bounds Read in strcmp
Dmitry Vyukov
- KASAN: slab-out-of-bounds Read in strcmp
Dmitry Vyukov
- linux-security move to 4.15.0-rc2?
Mimi Zohar
- linux-security move to 4.15.0-rc2?
James Morris
- Security subsystem tree merge to v4.15-rc3
James Morris
- Security subsystem tree merge to v4.15-rc3
Mimi Zohar
- Security subsystem tree merge to v4.15-rc3
Casey Schaufler
- Security subsystem tree merge to v4.15-rc3
James Morris
- setcap/getcap limitations
Serge E. Hallyn
- setcap/getcap limitations
Richard Guy Briggs
- Unique audit record type ranges for individual LSMs
Casey Schaufler
- Unique audit record type ranges for individual LSMs
Steve Grubb
- Unique audit record type ranges for individual LSMs
Steve Grubb
- Unique audit record type ranges for individual LSMs
Casey Schaufler
- Unique audit record type ranges for individual LSMs
Steve Grubb
- You will definetely be interested...
Sra. Angel Rania
Last message date:
Sat Dec 30 23:16:01 UTC 2017
Archived on: Mon Jan 15 08:42:40 UTC 2018
This archive was generated by
Pipermail 0.09 (Mailman edition).