summaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* KEYS: encrypted: fix buffer overread in valid_master_desc()Eric Biggers2018-02-161-16/+15
* selinux: general protection fault in sock_has_permMark Salyzyn2018-02-071-0/+2
* KEYS: Don't permit request_key() to construct a new keyringDavid Howells2017-12-201-0/+3
* Don't leak a key reference if request_key() tries to use a revoked keyringDavid Jeffery2017-12-201-0/+1
* KEYS: add missing permission check for request_key() destinationEric Biggers2017-12-161-9/+37
* ima: fix hash algorithm initializationBoshi Wang2017-12-091-0/+4
* ima: do not update security.ima if appraisal status is not INTEGRITY_PASSRoberto Sassu2017-11-241-0/+3
* security/keys: add CONFIG_KEYS_COMPAT to KconfigBilal Amarni2017-11-181-0/+4
* KEYS: trusted: fix writing past end of buffer in trusted_read()Eric Biggers2017-11-151-11/+12
* KEYS: trusted: sanitize all key materialEric Biggers2017-11-151-27/+22
* KEYS: return full count in keyring_read() if buffer is too smallEric Biggers2017-11-081-20/+19
* KEYS: don't let add_key() update an uninstantiated keyDavid Howells2017-10-271-0/+10
* KEYS: encrypted: fix dereference of NULL user_key_payloadEric Biggers2017-10-271-0/+7
* lsm: fix smack_inode_removexattr and xattr_getsecurity memleakCasey Schaufler2017-10-121-30/+25
* KEYS: prevent KEYCTL_READ on negative keyEric Biggers2017-10-051-0/+5
* KEYS: prevent creating a different user's keyringsEric Biggers2017-10-054-12/+23
* KEYS: fix writing past end of user-supplied buffer in keyring_read()Eric Biggers2017-10-051-9/+5
* KEYS: Fix an error code in request_master_key()Dan Carpenter2017-07-151-1/+1
* KEYS: fix freeing uninitialized memory in key_update()Eric Biggers2017-06-141-3/+2
* KEYS: fix dereferencing NULL payload with nonzero lengthEric Biggers2017-06-141-2/+2
* ima: accept previously set IMA_NEW_FILEDaniel Glöckner2017-05-251-2/+3
* KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyringsEric Biggers2017-04-302-24/+31
* KEYS: Change the name of the dead type to ".dead" to prevent user accessDavid Howells2017-04-301-1/+1
* KEYS: Disallow keyrings beginning with '.' to be joined as session keyringsDavid Howells2017-04-301-2/+7
* selinux: fix off-by-one in setprocattrStephen Smalley2017-04-181-1/+1
* KEYS: Fix short sprintf buffer in /proc/keys show functionDavid Howells2016-11-231-1/+1
* KEYS: potential uninitialized variableDan Carpenter2016-07-121-1/+1
* KEYS: Fix handling of stored error in a negatively instantiated user keyDavid Howells2016-04-133-2/+10
* security: let security modules use PTRACE_MODE_* with bitmasksJann Horn2016-04-132-7/+5
* ptrace: use fsuid, fsgid, effective creds for fs access checksJann Horn2016-04-121-1/+6
* EVM: Use crypto_memneq() for digest comparisonsRyan Ware2016-03-041-1/+2
* KEYS: Fix keyring ref leak in join_session_keyring()Yevgeny Pats2016-01-251-0/+1
* KEYS: Fix race between read and revokeDavid Howells2016-01-221-9/+9
* KEYS: Fix crash when attempt to garbage collect an uninstantiated keyringDavid Howells2015-11-181-2/+4
* KEYS: Fix race between key destruction and finding a keyring by nameDavid Howells2015-11-181-4/+4
* ima: extend "mask" policy matching supportMimi Zohar2015-08-271-5/+15
* ima: add support for new "euid" policy conditionMimi Zohar2015-08-271-4/+23
* evm: labeling pseudo filesystems exceptionMimi Zohar2015-08-041-0/+12
* KEYS: ensure we free the assoc array edit if edit is validColin Ian King2015-08-041-3/+5
* selinux: fix setting of security labels on NFSJ. Bruce Fields2015-07-201-1/+2
* ima: fix ima_show_template_data_ascii()Mimi Zohar2015-07-033-4/+5
* selinux/nlmsg: add XFRM_MSG_MAPPINGNicolas Dichtel2015-06-281-0/+1
* selinux/nlmsg: add XFRM_MSG_MIGRATENicolas Dichtel2015-06-281-0/+1
* selinux/nlmsg: add XFRM_MSG_REPORTNicolas Dichtel2015-06-281-0/+1
* selinux/nlmsg: add XFRM_MSG_[NEW|GET]SADINFONicolas Dichtel2015-06-281-0/+2
* selinux/nlmsg: add XFRM_MSG_GETSPDINFONicolas Dichtel2015-06-281-0/+1
* selinux/nlmsg: add XFRM_MSG_NEWSPDINFONicolas Dichtel2015-06-281-0/+1
* selinux: fix sel_write_enforce broken return valueJoe Perches2015-04-221-1/+1
* smack: fix possible use after frees in task_security() callersAndrey Ryabinin2015-03-062-11/+23
* KEYS: close race between key lookup and freeingSasha Levin2015-01-291-2/+2