December 2017 Archives by subject
      
      Starting: Fri Dec  1 01:55:18 UTC 2017
         Ending: Sat Dec 30 23:16:01 UTC 2017
         Messages: 214
     
- [BUG] kernel stack corruption during/after Netlabel error
 
James Morris
- [GIT PULL] Key subsystem fixes for 4.15
 
James Morris
- [GIT PULL] KEYS, ASN.1, X.509, PKCS#7: Fixes
 
David Howells
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use	request_module_cap() to load 'netdev-%s' modules
 
Daniel Micay
- [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use	request_module_cap() to load 'netdev-%s' modules
 
Marcus Meissner
- [Linux-ima-devel] [PATCH 12/12] ima: added	Documentation/security/IMA-digest-lists.txt
 
Ken Goldman
- [Linux-ima-devel] [PATCH 12/12] ima: added	Documentation/security/IMA-digest-lists.txt
 
Roberto Sassu
- [PATCH 0/6] LSM: Infrastructure management of security blobs for	stacking
 
Casey Schaufler
- [PATCH 06/11] capabilities: Allow privileged user in s_user_ns	to set security.* xattrs
 
Serge E. Hallyn
- [PATCH 06/11] capabilities: Allow privileged user in s_user_ns to set	security.* xattrs
 
Dongsu Park
- [PATCH 1/1] genalloc: track beginning of allocations
 
Igor Stoppa
- [PATCH 1/6] procfs: add smack subdir to attrs
 
Casey Schaufler
- [PATCH 11/11] evm: Don't update hmacs in user ns mounts
 
Dongsu Park
- [PATCH 11/11] evm: Don't update hmacs in user ns mounts
 
Serge E. Hallyn
- [PATCH 11/11] evm: Don't update hmacs in user ns mounts
 
Mimi Zohar
- [PATCH 11/11] evm: Don't update hmacs in user ns mounts
 
Mimi Zohar
- [PATCH 2/4] sctp: Add ip option support
 
Marcelo Ricardo Leitner
- [PATCH 2/4] sctp: Add ip option support
 
Marcelo Ricardo Leitner
- [PATCH 2/4] sctp: Add ip option support
 
Paul Moore
- [PATCH 2/4] sctp: Add ip option support
 
Marcelo Ricardo Leitner
- [PATCH 2/4] sctp: Add ip option support
 
Paul Moore
- [PATCH 2/4] sctp: Add ip option support
 
Marcelo Ricardo Leitner
- [PATCH 2/4] sctp: Add ip option support
 
Paul Moore
- [PATCH 2/6] LSM: Manage credential security blobs
 
Casey Schaufler
- [PATCH 29/45] security: apparmor: remove duplicate includes
 
Pravin Shedge
- [PATCH 3/6] LSM: Manage file security blobs
 
Casey Schaufler
- [PATCH 4/4] selinux: Add SCTP support
 
Richard Haines
- [PATCH 4/6] LSM: Manage task security blobs
 
Casey Schaufler
- [PATCH 5/6] LSM: Manage remaining security blobs
 
Casey Schaufler
- [PATCH 5/9] LSM: Manage remaining security blobs
 
Tetsuo Handa
- [PATCH 5/9] LSM: Manage remaining security blobs
 
Casey Schaufler
- [PATCH 6/6] LSM: General stacking
 
Casey Schaufler
- [PATCH tip/core/rcu 15/21] keyring: Remove now-redundant	smp_read_barrier_depends()
 
Paul E. McKenney
- [PATCH tip/core/rcu 15/21] keyring: Remove now-redundant	smp_read_barrier_depends()
 
James Morris
- [PATCH tip/core/rcu 15/21] keyring: Remove now-redundant	smp_read_barrier_depends()
 
Paul E. McKenney
- [PATCH v2 00/15] ima: digest list feature
 
Ken Goldman
- [PATCH v2 00/15] ima: digest list feature
 
Roberto Sassu
- [PATCH v2] ima: Fix warn potential negative subtraction from max
 
Vasyl Gomonovych
- [PATCH v2] ima: log message to module appraisal error
 
Bruno E. O. Meneguele
- [PATCH v2] ima: log message to module appraisal error
 
Joe Perches
- [PATCH v2] ima: log message to module appraisal error
 
Bruno E. O. Meneguele
- [PATCH V2] selinux: Add SCTP support
 
Richard Haines
- [PATCH V2] selinux: Add SCTP support
 
Marcelo Ricardo Leitner
- [PATCH V2] selinux: Add SCTP support
 
Paul Moore
- [PATCH V2] selinux: Add SCTP support
 
David Miller
- [PATCH V2] selinux: Add SCTP support
 
Paul Moore
- [PATCH v2] tpm: Fix the driver cleanup code
 
Azhar Shaikh
- [PATCH v2] tpm: Fix the driver cleanup code
 
Jason Gunthorpe
- [PATCH v2] tpm: Fix the driver cleanup code
 
Jarkko Sakkinen
- [PATCH v2] tpm: Fix the driver cleanup code
 
Shaikh, Azhar
- [PATCH v2] tpm: Fix the driver cleanup code
 
Shaikh, Azhar
- [PATCH v3 0/4] Add SELinux SCTP protocol support
 
Marcelo Ricardo Leitner
- [PATCH v3 1/4] security: Add support for SCTP security hooks
 
Marcelo Ricardo Leitner
- [PATCH v3 1/4] security: Add support for SCTP security hooks
 
Casey Schaufler
- [PATCH v3 1/4] security: Add support for SCTP security hooks
 
Marcelo Ricardo Leitner
- [PATCH v3 1/4] security: Add support for SCTP security hooks
 
Richard Haines
- [PATCH v3 1/4] security: Add support for SCTP security hooks
 
Paul Moore
- [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
 
Matthew Garrett
- [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
 
Matthew Garrett
- [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
 
Mimi Zohar
- [PATCH v3 2/4] sctp: Add ip option support
 
Marcelo Ricardo Leitner
- [PATCH v3 3/4] sctp: Add LSM hooks
 
Marcelo Ricardo Leitner
- [PATCH v3 4/4] selinux: Add SCTP support
 
Marcelo Ricardo Leitner
- [PATCH v3] ima: log message to module appraisal error
 
Bruno E. O. Meneguele
- [PATCH V4 0/4] Add SELinux SCTP protocol support
 
Richard Haines
- [PATCH V4 1/4] security: Add support for SCTP security hooks
 
Richard Haines
- [PATCH V4 1/4] security: Add support for SCTP security hooks
 
Marcelo Ricardo Leitner
- [PATCH V4 2/4] sctp: Add ip option support
 
Richard Haines
- [PATCH V4 2/4] sctp: Add ip option support
 
Marcelo Ricardo Leitner
- [PATCH V4 3/4] sctp: Add LSM hooks
 
Richard Haines
- [PATCH V4 3/4] sctp: Add LSM hooks
 
Marcelo Ricardo Leitner
- [PATCH V4 4/4] selinux: Add SCTP support
 
Richard Haines
- [PATCH V4 4/4] selinux: Add SCTP support
 
Marcelo Ricardo Leitner
- [PATCH v6 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
 
Jarkko Sakkinen
- [PATCH v6 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
 
Shaikh, Azhar
- [PATCH v6 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
 
Azhar Shaikh
- [PATCH v6 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
 
Jarkko Sakkinen
- [PATCH v6 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
 
Azhar Shaikh
- [PATCH v6 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
 
Jarkko Sakkinen
- [PATCH v6 1/2] tpm_tis: Move ilb_base_addr to tpm_tis_data
 
Azhar Shaikh
- [PATCH v6 2/2] tpm: Keep CLKRUN enabled throughout the duration of	transmit_cmd()
 
Azhar Shaikh
- [PATCH v7 1/2] tpm_tis: Move ilb_base_addr to tpm_tis_data
 
Azhar Shaikh
- [PATCH v7 2/2] tpm: Keep CLKRUN enabled throughout the duration of	transmit_cmd()
 
Azhar Shaikh
- [PATCH] ima: Fix warn potential negative subtraction from max
 
Vasyl Gomonovych
- [PATCH] ima: Fix warn potential negative subtraction from max
 
Serge E. Hallyn
- [PATCH] ima: log message to module appraisal error
 
Bruno E. O. Meneguele
- [PATCH] integrity: get rid of unneeded initializations in	integrity_iint_cache entries
 
Jeff Layton
- [PATCH] integrity: get rid of unneeded initializations in	integrity_iint_cache entries
 
Mimi Zohar
- [PATCH] integrity: get rid of unneeded initializations in	integrity_iint_cache entries
 
Jeff Layton
- [PATCH] security: Export few symbols referred by other modules
 
Hareesh Gundu
- [PATCH] security: Export few symbols referred by other modules
 
James Morris
- [PATCH] security: Export few symbols referred by other modules
 
Tetsuo Handa
- [PATCH] security: Export few symbols referred by other modules
 
Greg KH
- [PATCH] security: Export few symbols referred by other modules
 
Hareesh Gundu
- [PATCH] security: Export few symbols referred by other modules
 
Greg KH
- [PATCH] security: Export few symbols referred by other modules
 
James Morris
- [PATCH] security: keys: remove redundant assignment to key_ref
 
Colin King
- [PATCH] security: keys: remove redundant assignment to key_ref
 
James Morris
- [PATCH] security: keys: remove redundant assignment to key_ref
 
David Howells
- [PATCH] security: keys: remove redundant assignment to key_ref
 
Julia Lawall
- [PATCH] security: keys: remove redundant assignment to key_ref
 
James Morris
- [PATCH] Smack: fix dereferenced before check
 
Vasyl Gomonovych
- [PATCH] Smack: fix dereferenced before check
 
Serge E. Hallyn
- [PATCH] Smack: fix dereferenced before check
 
Casey Schaufler
- [PATCH] tpm: Fix the driver cleanup code
 
Azhar Shaikh
- [PATCH] tpm: Fix the driver cleanup code
 
Jason Gunthorpe
- [PATCH] tpm: Fix the driver cleanup code
 
Shaikh, Azhar
- [PATCH] tpm: Fix the driver cleanup code
 
Jason Gunthorpe
- [PATCH] tpm: Fix the driver cleanup code
 
Shaikh, Azhar
- [PATCH] tpm: Fix the driver cleanup code
 
Jason Gunthorpe
- [PATCH] treewide: remove duplicate includes
 
Pravin Shedge
- [PATCH] treewide: remove duplicate includes
 
Luis R. Rodriguez
- [PATCH] treewide: remove duplicate includes
 
Joe Perches
- [PATCH] treewide: remove duplicate includes
 
Greg KH
- [PATCH] treewide: remove duplicate includes
 
Darrick J. Wong
- [PATCH] treewide: remove duplicate includes
 
Eduardo Valentin
- [PATCH] userns: honour no_new_privs for cap_bset during user ns	creation/switch
 
Maciej Żenczykowski
- [PATCH] userns: honour no_new_privs for cap_bset during user ns	creation/switch
 
Eric W. Biederman
- [PATCH] userns: honour no_new_privs for cap_bset during user ns	creation/switch
 
Maciej Żenczykowski
- [PATCH] userns: honour no_new_privs for cap_bset during user ns	creation/switch
 
Eric W. Biederman
- [PATCH] userns: honour no_new_privs for cap_bset during user ns	creation/switch
 
Maciej Żenczykowski
- [PATCH] userns: honour no_new_privs for cap_bset during user ns	creation/switch
 
Eric W. Biederman
- [PATCH] userns: honour no_new_privs for cap_bset during user ns	creation/switch
 
Eric W. Biederman
- [PATCHv5 1/1] ima: re-introduce own integrity cache lock
 
Dmitry Kasatkin
- [PATCHv5 1/1] ima: re-introduce own integrity cache lock
 
Mimi Zohar
- [PATCHv5 1/1] ima: re-introduce own integrity cache lock
 
Roberto Sassu
- [PATCHv5 1/1] ima: re-introduce own integrity cache lock
 
Dmitry Kasatkin
- [PATCHv5 1/1] ima: re-introduce own integrity cache lock
 
Dmitry Kasatkin
- [PATCHv6 1/1] ima: re-introduce own integrity cache lock
 
Dmitry Kasatkin
- [PATCHv6 1/1] ima: re-introduce own integrity cache lock
 
Dmitry Kasatkin
- [question] should 363b02dab09b3 be backported to stable 4.1+?
 
Sergey Senozhatsky
- [question] should 363b02dab09b3 be backported to stable 4.1+?
 
Eric Biggers
- [question] should 363b02dab09b3 be backported to stable 4.1+?
 
Sergey Senozhatsky
- [RFC 0/3] Safe, dynamically (un)loadable LSMs
 
Igor Stoppa
- [RFC 0/3] Safe, dynamically (un)loadable LSMs
 
Sargun Dhillon
- [RFC 0/3] Safe, dynamically (un)loadable LSMs
 
Casey Schaufler
- [RFC 0/3] Safe, dynamically (un)loadable LSMs
 
Sargun Dhillon
- [RFC 0/3] Safe, dynamically (un)loadable LSMs
 
James Morris
- [RFC 0/3] Safe, dynamically (un)loadable LSMs
 
Sargun Dhillon
- [RFC PATCH 0/1] genalloc: track beginning of allocations
 
Igor Stoppa
- [RFC PATCH 2/4] ima: define new ima_sb_post_new_mount hook
 
Jeff Layton
- [RFC PATCH 2/4] ima: define new ima_sb_post_new_mount hook
 
Mimi Zohar
- [RFC PATCH 2/4] ima: define new ima_sb_post_new_mount hook
 
Jeff Layton
- [RFC PATCH 2/4] ima: define new ima_sb_post_new_mount hook
 
Mimi Zohar
- [RFC PATCH 2/4] ima: define new ima_sb_post_new_mount hook
 
Jeff Layton
- [RFC PATCH 2/4] ima: define new ima_sb_post_new_mount hook
 
Jeff Layton
- [RFC v2 0/3] Safe, dynamically loadable LSM
 
Sargun Dhillon
- [RFC v2 1/3] security: Add safe,	dynamic (runtime-loadable) hook support
 
Tetsuo Handa
- [RFC v2 1/3] security: Add safe,	dynamic (runtime-loadable) hook support
 
Sargun Dhillon
- [RFC v2 1/3] security: Add safe, dynamic (runtime-loadable) hook	support
 
Sargun Dhillon
- [RFC v2 1/3] security: Add safe, dynamic (runtime-loadable) hook	support
 
Casey Schaufler
- [RFC v2 1/3] security: Add safe, dynamic (runtime-loadable) hook	support
 
James Morris
- [RFC v2 1/3] security: Add safe, dynamic (runtime-loadable) hook	support
 
James Morris
- [RFC v2 2/3] LSM: Add statistics about the invocation of dynamic	hooks
 
Casey Schaufler
- [RFC v2 2/3] LSM: Add statistics about the invocation of dynamic	hooks
 
James Morris
- [RFC v2 2/3] LSM: Add statistics about the invocation of dynamic hooks
 
Sargun Dhillon
- [RFC v2 3/3] LSM: Add an example sample dynamic LSM
 
Sargun Dhillon
- [RFC][PATCH v2 1/9] ima: pass filename to	ima_rdwr_violation_check()
 
Mimi Zohar
- [RFC][PATCH v2 2/9] ima: preserve flags in	ima_inode_post_setattr() if file must be appraised
 
Mimi Zohar
- [RFC][PATCH v2 3/9] ima: preserve iint flags if security.ima	update is successful
 
Mimi Zohar
- ATTENTION!!!
 
Loretta Robles
- BUG: unable to handle kernel NULL pointer dereference in	sidtab_search_core
 
Paul Moore
- BUG: unable to handle kernel NULL pointer dereference in	sidtab_search_core
 
Dmitry Vyukov
- BUG: unable to handle kernel NULL pointer dereference in	sidtab_search_core
 
Paul Moore
- BUG: unable to handle kernel NULL pointer dereference in	sidtab_search_core
 
Dmitry Vyukov
- BUG: unable to handle kernel NULL pointer dereference in	sidtab_search_core
 
Dmitry Vyukov
- BUG: unable to handle kernel NULL pointer dereference in	sidtab_search_core
 
Paul Moore
- BUG: unable to handle kernel NULL pointer dereference in	sidtab_search_core
 
Paul Moore
- BUG: unable to handle kernel NULL pointer dereference in	sidtab_search_core
 
Dmitry Vyukov
- BUG: unable to handle kernel NULL pointer dereference in	sidtab_search_core
 
Dmitry Vyukov
- BUG: unable to handle kernel NULL pointer dereference in	sidtab_search_core
 
Eric Biggers
- BUG: unable to handle kernel NULL pointer dereference in	sidtab_search_core
 
Paul Moore
- BUG: unable to handle kernel NULL pointer dereference in	sidtab_search_core
 
Paul Moore
- BUG: unable to handle kernel paging request in	security_compute_sid
 
Eric Biggers
- BUG: unable to handle kernel paging request in	security_compute_sid
 
Dmitry Vyukov
- Differentiating audit rules in an LSM stack
 
Casey Schaufler
- Differentiating audit rules in an LSM stack
 
Paul Moore
- Documentation patch for namespaced file capabilities
 
Michael Kerrisk (man-pages)
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel	lockdown
 
Luis R. Rodriguez
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel	lockdown
 
Alan Cox
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel	lockdown
 
Luis R. Rodriguez
- Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel	lockdown
 
Alan Cox
- KASAN: slab-out-of-bounds Read in strcmp
 
Tetsuo Handa
- KASAN: slab-out-of-bounds Read in strcmp
 
Tetsuo Handa
- KASAN: slab-out-of-bounds Read in strcmp
 
James Morris
- KASAN: slab-out-of-bounds Read in strcmp
 
Dmitry Vyukov
- KASAN: slab-out-of-bounds Read in strcmp
 
Tetsuo Handa
- KASAN: slab-out-of-bounds Read in strcmp
 
Tetsuo Handa
- KASAN: slab-out-of-bounds Read in strcmp
 
Stephen Smalley
- KASAN: slab-out-of-bounds Read in strcmp
 
Dmitry Vyukov
- KASAN: slab-out-of-bounds Read in strcmp
 
Paul Moore
- KASAN: slab-out-of-bounds Read in strcmp
 
Tetsuo Handa
- KASAN: slab-out-of-bounds Read in strcmp
 
Dmitry Vyukov
- KASAN: slab-out-of-bounds Read in strcmp
 
Dmitry Vyukov
- KASAN: slab-out-of-bounds Read in strcmp
 
Stephen Smalley
- KASAN: slab-out-of-bounds Read in strcmp
 
Paul Moore
- KASAN: slab-out-of-bounds Read in strcmp
 
Dmitry Vyukov
- KASAN: slab-out-of-bounds Read in strcmp
 
Dmitry Vyukov
- KASAN: slab-out-of-bounds Read in strcmp
 
Dmitry Vyukov
- KASAN: slab-out-of-bounds Read in strcmp
 
Dmitry Vyukov
- linux-security move to 4.15.0-rc2?
 
Mimi Zohar
- linux-security move to 4.15.0-rc2?
 
James Morris
- Security subsystem tree merge to v4.15-rc3
 
James Morris
- Security subsystem tree merge to v4.15-rc3
 
Mimi Zohar
- Security subsystem tree merge to v4.15-rc3
 
Casey Schaufler
- Security subsystem tree merge to v4.15-rc3
 
James Morris
- setcap/getcap limitations
 
Serge E. Hallyn
- setcap/getcap limitations
 
Richard Guy Briggs
- Unique audit record type ranges for individual LSMs
 
Casey Schaufler
- Unique audit record type ranges for individual LSMs
 
Steve Grubb
- Unique audit record type ranges for individual LSMs
 
Steve Grubb
- Unique audit record type ranges for individual LSMs
 
Casey Schaufler
- Unique audit record type ranges for individual LSMs
 
Steve Grubb
- You will definetely be interested...
 
Sra. Angel Rania
    
      Last message date: 
       Sat Dec 30 23:16:01 UTC 2017
    Archived on: Mon Jan 15 08:42:40 UTC 2018
    
   
     
     
     This archive was generated by
     Pipermail 0.09 (Mailman edition).