summaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* KEYS: always initialize keyring_index_key::desc_lenEric Biggers2019-02-274-6/+4
* KEYS: allow reaching the keys quotas exactlyEric Biggers2019-02-271-2/+2
* smack: fix access permissions for keyringZoran Markovic2019-02-121-3/+9
* selinux: always allow mounting submountsOndrej Mosnacek2019-01-261-1/+1
* selinux: fix GPF on invalid policyStephen Smalley2019-01-231-1/+2
* LSM: Check for NULL cred-security on freeJames Morris2019-01-231-0/+7
* Yama: Check for pid death before checking ancestryKees Cook2019-01-231-1/+3
* ima: re-initialize iint->atomic_flagsMimi Zohar2018-12-011-0/+1
* ima: re-introduce own integrity cache lockDmitry Kasatkin2018-12-014-40/+77
* EVM: Add support for portable signature formatMatthew Garrett2018-12-015-21/+91
* ima: always measure and audit files in policyMimi Zohar2018-12-013-30/+56
* Revert "evm: Translate user/group ids relative to s_user_ns when computing HMAC"Eric W. Biederman2018-12-011-2/+10
* selinux: Add __GFP_NOWARN to allocation at str_read()Tetsuo Handa2018-12-011-1/+1
* ima: fix showing large 'violations' or 'runtime_measurements_count'Eric Biggers2018-11-131-3/+3
* evm: Don't deadlock if a crypto algorithm is unavailableMatthew Garrett2018-09-261-1/+2
* Smack: Fix handling of IPv4 traffic received by PF_INET6 socketsPiotr Sawicki2018-09-261-5/+9
* selinux: use GFP_NOWAIT in the AVC kmem_cachesMichal Hocko2018-09-191-8/+6
* Smack: Mark inode instant in smack_task_to_inodeCasey Schaufler2018-08-241-0/+1
* ima: based on policy verify firmware signatures (pre-allocated buffer)Mimi Zohar2018-08-031-0/+1
* selinux: KASAN: slab-out-of-bounds in xattr_getsecuritySachin Grover2018-06-061-1/+1
* Revert "ima: limit file hash setting by user to fix and log modes"Mimi Zohar2018-06-061-6/+2
* ima: Fallback to the builtin hash algorithmPetr Vorel2018-05-302-0/+15
* integrity/security: fix digsig.c build error with header fileRandy Dunlap2018-05-301-0/+1
* selinux: do not check open permission on socketsStephen Smalley2018-04-131-3/+7
* selinux: Remove redundant check for unknown labeling behaviorMatthias Kaehlcke2018-04-081-16/+0
* selinux: Remove unnecessary check of array base in selinux_set_mapping()Matthias Kaehlcke2018-04-081-1/+1
* ima: relax requiring a file signature for new files with zero lengthMimi Zohar2018-03-221-1/+2
* apparmor: Make path_max parameter readonlyJohn Johansen2018-03-221-1/+1
* selinux: check for address length in selinux_socket_bind()Alexander Potapenko2018-03-221-0/+8
* security/keys: BIG_KEY requires CONFIG_CRYPTOArnd Bergmann2018-02-251-0/+1
* selinux: skip bounded transition processing if the policy isn't loadedPaul Moore2018-02-251-0/+3
* selinux: ensure the context is NUL terminated in security_context_to_sid_core()Paul Moore2018-02-251-10/+8
* KEYS: encrypted: fix buffer overread in valid_master_desc()Eric Biggers2018-02-131-16/+15
* KPTI: Rename to PAGE_TABLE_ISOLATIONKees Cook2018-01-051-1/+1
* x86/kaiser: Reenable PARAVIRTBorislav Petkov2018-01-051-1/+1
* kaiser: delete KAISER_REAL_SWITCH optionHugh Dickins2018-01-051-4/+0
* kaiser: KAISER depends on SMPHugh Dickins2018-01-051-4/+6
* kaiser: merged updateDave Hansen2018-01-051-0/+5
* KAISER: Kernel Address IsolationRichard Fellner2018-01-051-0/+7
* KEYS: add missing permission check for request_key() destinationEric Biggers2017-12-141-9/+37
* ima: fix hash algorithm initializationBoshi Wang2017-12-091-0/+4
* ima: do not update security.ima if appraisal status is not INTEGRITY_PASSRoberto Sassu2017-11-241-0/+3
* security/keys: add CONFIG_KEYS_COMPAT to KconfigBilal Amarni2017-11-181-0/+4
* KEYS: trusted: fix writing past end of buffer in trusted_read()Eric Biggers2017-11-151-11/+12
* KEYS: trusted: sanitize all key materialEric Biggers2017-11-151-28/+22
* apparmor: fix undefined reference to `aa_g_hash_policy'John Johansen2017-11-151-1/+1
* KEYS: return full count in keyring_read() if buffer is too smallEric Biggers2017-11-081-20/+19
* KEYS: Fix race between updating and finding a negative keyDavid Howells2017-10-2712-39/+49
* KEYS: don't let add_key() update an uninstantiated keyDavid Howells2017-10-271-0/+10
* KEYS: encrypted: fix dereference of NULL user_key_payloadEric Biggers2017-10-271-0/+7