summaryrefslogtreecommitdiffstats
path: root/security
Commit message (Expand)AuthorAgeFilesLines
* ima: fix blocking of security.ima xattrs of unsupported algorithmsMimi Zohar2022-10-241-4/+8
* efi: Correct Macmini DMI match in uefi cert quirkOrlando Chamberlain2022-10-151-1/+1
* hardening: Remove Clang's enable flag for -ftrivial-auto-var-init=zeroKees Cook2022-10-121-4/+10
* Smack: Provide read control for io_uring_cmdCasey Schaufler2022-09-151-0/+32
* selinux: implement the security_uring_cmd() LSM hookPaul Moore2022-09-152-1/+25
* lsm,io_uring: add LSM hooks for the new uring_cmd file opLuis Chamberlain2022-09-151-0/+4
* landlock: Fix file reparenting without explicit LANDLOCK_ACCESS_FS_REFERMickaël Salaün2022-09-081-23/+25
* apparmor: Fix memleak in aa_simple_write_to_buffer()Xiu Jianfeng2022-08-251-1/+1
* apparmor: fix reference count leak in aa_pivotroot()Xin Xiong2022-08-251-0/+1
* apparmor: fix overlapping attachment computationJohn Johansen2022-08-252-2/+2
* apparmor: fix setting unconfined mode on a loaded profileJohn Johansen2022-08-251-5/+7
* apparmor: fix aa_label_asxprint return checkTom Rix2022-08-251-3/+3
* apparmor: Fix failed mount permission check error messageJohn Johansen2022-08-251-3/+4
* apparmor: fix absroot causing audited secids to begin with =John Johansen2022-08-252-3/+9
* apparmor: fix quiet_denied for file rulesJohn Johansen2022-08-251-1/+1
* selinux: Add boundary check in put_entry()Xiu Jianfeng2022-08-171-0/+2
* selinux: fix memleak in security_read_state_kernel()Xiu Jianfeng2022-08-171-1/+8
* lockdown: Fix kexec lockdown bypass with ima policyEric Snowberg2022-07-201-0/+4
* Merge tag 'integrity-v5.19-fix' of git://git.kernel.org/pub/scm/linux/kernel/...Linus Torvalds2022-07-145-9/+10
|\
| * ima: Fix potential memory leak in ima_init_crypto()Jianglei Nie2022-07-131-0/+1
| * ima: force signature verification when CONFIG_KEXEC_SIG is configuredCoiby Xu2022-07-131-0/+2
| * ima: Fix a potential integer overflow in ima_appraise_measurementHuaxin Lu2022-07-071-1/+2
| * ima: fix violation measurement list recordMimi Zohar2022-07-061-3/+3
| * Revert "evm: Fix memleak in init_desc"Xiu Jianfeng2022-06-151-5/+2
* | x86/retbleed: Add fine grained Kconfig knobsPeter Zijlstra2022-06-291-11/+0
* | selinux: free contexts previously transferred in selinux_add_opt()Christian Göttsche2022-06-151-7/+4
|/
* KEYS: trusted: tpm2: Fix migratable logicDavid Safford2022-06-081-2/+2
* Merge tag 'pull-18-rc1-work.mount' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2022-06-041-0/+1
|\
| * move mount-related externs from fs.h to mount.hAl Viro2022-05-191-0/+1
* | Merge tag 'linux-kselftest-kunit-5.19-rc1' of git://git.kernel.org/pub/scm/li...Linus Torvalds2022-05-251-3/+3
|\ \
| * | apparmor: test: Use NULL macrosRicardo Ribalda2022-04-041-3/+3
| |/
* | Merge tag 'integrity-v5.19' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds2022-05-2416-52/+395
|\ \
| * | integrity: Fix sparse warnings in keyring_handlerStefan Berger2022-05-161-3/+3
| * | evm: Clean up some variablesStefan Berger2022-05-162-4/+1
| * | evm: Return INTEGRITY_PASS for enum integrity_status value '0'Stefan Berger2022-05-161-1/+1
| * | efi: Do not import certificates from UEFI Secure Boot for T2 MacsAditya Garg2022-05-152-0/+41
| * | ima: support fs-verity file digest based version 3 signaturesMimi Zohar2022-05-055-16/+177
| * | ima: permit fsverity's file digests in the IMA measurement listMimi Zohar2022-05-055-8/+90
| * | ima: define a new template field named 'd-ngv2' and templatesMimi Zohar2022-05-053-11/+73
| * | ima: use IMA default hash algorithm for integrity violationsMimi Zohar2022-05-011-1/+1
| * | ima: fix 'd-ng' comments and documentationMimi Zohar2022-05-011-3/+5
| * | ima: remove the IMA_TEMPLATE Kconfig optionGUO Zihua2022-04-071-8/+6
| * | ima: remove redundant initialization of pointer 'file'.Colin Ian King2022-04-041-1/+1
| |/
* | Merge tag 'tpmdd-next-v5.19-rc1' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2022-05-246-43/+174
|\ \
| * | KEYS: trusted: Introduce support for NXP CAAM-based trusted keysAhmad Fatoum2022-05-234-2/+97
| * | KEYS: trusted: allow use of kernel RNG for key materialAhmad Fatoum2022-05-231-1/+34
| * | KEYS: trusted: allow use of TEE as backend without TCG_TPM supportAhmad Fatoum2022-05-234-17/+42
| * | certs: Factor out the blacklist hash creationMickaël Salaün2022-05-231-24/+2
* | | Merge tag 'Smack-for-5.19' of https://github.com/cschaufler/smack-nextLinus Torvalds2022-05-241-1/+0
|\ \ \
| * | | smack: Remove redundant assignmentsMichal Orzel2022-05-231-1/+0
| |/ /