summaryrefslogtreecommitdiff
path: root/security
AgeCommit message (Expand)AuthorFilesLines
2016-01-22KEYS: Fix race between read and revokeDavid Howells1-9/+9
2015-11-17KEYS: Fix crash when attempt to garbage collect an uninstantiated keyringDavid Howells1-2/+4
2015-11-17KEYS: Fix race between key destruction and finding a keyring by nameDavid Howells1-4/+4
2015-10-13fs: create and use seq_show_option for escapingKees Cook1-1/+1
2015-08-07selinux/nlmsg: add XFRM_MSG_MAPPINGNicolas Dichtel1-0/+1
2015-08-07selinux/nlmsg: add XFRM_MSG_MIGRATENicolas Dichtel1-0/+1
2015-08-07selinux/nlmsg: add XFRM_MSG_REPORTNicolas Dichtel1-0/+1
2015-08-07selinux/nlmsg: add XFRM_MSG_[NEW|GET]SADINFONicolas Dichtel1-0/+2
2015-08-07selinux/nlmsg: add XFRM_MSG_GETSPDINFONicolas Dichtel1-0/+1
2015-05-09selinux: fix sel_write_enforce broken return valueJoe Perches1-1/+1
2015-05-09smack: fix possible use after frees in task_security() callersAndrey Ryabinin2-11/+23
2015-02-20KEYS: close race between key lookup and freeingSasha Levin1-2/+2
2015-02-20KEYS: Fix stale key registration at error pathTakashi Iwai1-1/+4
2015-01-01move d_rcu from overlapping d_child to overlapping d_aliasAl Viro1-3/+3
2014-12-14evm: check xattr value length and type in evm_inode_setxattr()Dmitry Kasatkin1-3/+6
2014-12-14selinux: fix inode security list corruptionStephen Smalley1-1/+1
2014-09-13netlabel: fix a problem when setting bits below the previously lowest bitPaul Moore1-1/+1
2014-07-11evm: prohibit userspace writing 'security.evm' HMAC valueMimi Zohar1-2/+10
2014-04-30selinux: correctly label /proc inodes in use before the policy is loadedPaul Moore1-9/+27
2014-04-02SELinux: bigendian problems with filename trans rulesEric Paris1-4/+4
2014-04-02SELinux: Fix kernel BUG on empty security contexts.Stephen Smalley1-0/+4
2014-04-02SELinux: Fix memory leak upon loading policyTetsuo Handa1-1/+13
2014-04-02selinux: process labeled IPsec TCP SYN-ACK packets properly in selinux_ip_pos...Paul Moore1-7/+35
2014-02-15SELinux: Fix possible NULL pointer dereference in selinux_inode_permission()Steven Rostedt2-3/+22
2014-02-15selinux: selinux_setprocattr()->ptrace_parent() needs rcu_read_lock()Oleg Nesterov1-2/+2
2014-02-15selinux: fix broken peer recv checkChad Hanson1-1/+3
2014-01-03selinux: handle TCP SYN-ACK packets correctly in selinux_ip_postroute()Paul Moore1-15/+53
2014-01-03selinux: handle TCP SYN-ACK packets correctly in selinux_ip_output()Paul Moore1-2/+23
2014-01-03selinux: correct locking in selinux_netlbl_socket_connect)Paul Moore1-4/+2
2013-04-10key: Fix resource leakAlan Cox1-2/+2
2013-03-27selinux: use GFP_ATOMIC under spin_lockDan Carpenter1-1/+1
2013-03-20Fix: compat_rw_copy_check_uvector() misuse in aio, readv, writev, and securit...Mathieu Desnoyers1-2/+2
2013-03-20keys: fix race with concurrent install_user_keyrings()David Howells1-1/+1
2013-02-06evm: checking if removexattr is not a NULLDmitry Kasatkin1-2/+2
2013-01-03Revert "device_cgroup: fix RCU usage"Ben Hutchings1-3/+3
2012-12-06selinux: fix sel_netnode_insert() suspicious rcu dereferenceDave Jones1-1/+2
2012-12-06device_cgroup: fix RCU usageTejun Heo1-3/+3
2012-05-31SELinux: if sel_make_bools errors don't leave inconsistent stateEric Paris1-0/+1
2012-04-22security: fix compile error in commoncap.cJonghwan Choi1-0/+1
2012-04-22fcaps: clear the same personality flags as suid when fcaps are usedEric Paris1-0/+5
2012-04-13TOMOYO: Fix mount flags checking order.Tetsuo Handa1-18/+20
2012-04-02ima: fix Kconfig dependenciesFabio Estevam1-1/+1
2012-02-29Security: tomoyo: add .gitignore fileGreg Kroah-Hartman1-0/+2
2012-01-25TOMOYO: Accept \000 as a valid character.Tetsuo Handa1-3/+3
2012-01-25ima: fix invalid memory referenceRoberto Sassu1-5/+11
2012-01-25ima: free duplicate measurement memoryRoberto Sassu2-2/+3
2012-01-03security: Fix security_old_inode_init_security() when CONFIG_SECURITY is not setJan Kara1-1/+1
2011-12-21SELinux: Fix RCU deref check warning in sel_netport_insert()David Howells1-1/+3
2011-12-20evm: prevent racing during tfm allocationDmitry Kasatkin1-0/+9
2011-12-20evm: key must be set once during initializationDmitry Kasatkin1-4/+6