messages from 2017-11-29 18:39:50 to 2017-12-21 21:06:05 UTC [more...]
[PATCH] userns: honour no_new_privs for cap_bset during user ns creation/switch
2017-12-21 21:06 UTC
BUG: unable to handle kernel NULL pointer dereference in sidtab_search_core
2017-12-21 20:40 UTC
[PATCH] tpm: Fix the driver cleanup code
2017-12-21 20:38 UTC (4+ messages)
[PATCH] Smack: fix dereferenced before check
2017-12-21 18:06 UTC (3+ messages)
[PATCH] ima: Fix warn potential negative subtraction from max
2017-12-21 18:00 UTC (2+ messages)
[PATCH 0/6] LSM: Infrastructure management of security blobs for stacking
2017-12-19 22:38 UTC (7+ messages)
` [PATCH 1/6] procfs: add smack subdir to attrs
` [PATCH 2/6] LSM: Manage credential security blobs
` [PATCH 3/6] LSM: Manage file "
` [PATCH 4/6] LSM: Manage task "
` [PATCH 6/6] LSM: General stacking
` [PATCH 5/6] LSM: Manage remaining security blobs
Security subsystem tree merge to v4.15-rc3
2017-12-19 20:34 UTC (4+ messages)
Documentation patch for namespaced file capabilities
2017-12-19 15:33 UTC (3+ messages)
[RFC PATCH 0/1] genalloc: track beginning of allocations
2017-12-18 21:33 UTC (2+ messages)
` [PATCH 1/1] "
[PATCH V3 1/2] security: Add a cred_getsecid hook
2017-12-18 15:39 UTC (10+ messages)
` [PATCH V3 2/2] IMA: Support using new creds in appraisal policy
[RFC PATCH 0/4] ima: filesystems not mounted with i_version
2017-12-15 21:13 UTC (8+ messages)
` [RFC PATCH 2/4] ima: define new ima_sb_post_new_mount hook
setcap/getcap limitations
2017-12-15 16:28 UTC (7+ messages)
[PATCH 2/4] sctp: Add ip option support
2017-12-15 14:02 UTC (8+ messages)
[question] should 363b02dab09b3 be backported to stable 4.1+?
2017-12-15 5:08 UTC (3+ messages)
[PATCHv6 1/1] ima: re-introduce own integrity cache lock
2017-12-13 22:22 UTC (2+ messages)
[RFC v2 1/3] security: Add safe, dynamic (runtime-loadable) hook support
2017-12-13 12:38 UTC (10+ messages)
` [RFC v2 2/3] LSM: Add statistics about the invocation of dynamic hooks
` [RFC v2 3/3] LSM: Add an example sample dynamic LSM
Unique audit record type ranges for individual LSMs
2017-12-12 3:42 UTC (5+ messages)
[GIT PULL] Key subsystem fixes for 4.15
2017-12-09 5:25 UTC
KASAN: slab-out-of-bounds Read in strcmp
2017-12-08 17:50 UTC (18+ messages)
Firmware signing -- Re: [PATCH 00/27] security, efi: Add kernel lockdown
2017-12-08 17:11 UTC (20+ messages)
[GIT PULL] KEYS, ASN.1, X.509, PKCS#7: Fixes
2017-12-08 15:41 UTC
[PATCH v6 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
2017-12-08 10:51 UTC (4+ messages)
` [PATCH v6 1/2] tpm_tis: Move ilb_base_addr to tpm_tis_data
` [PATCH v6 2/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
[RFC v2 0/3] Safe, dynamically loadable LSM
2017-12-08 4:23 UTC
[RFC 0/3] Safe, dynamically (un)loadable LSMs
2017-12-08 0:14 UTC (8+ messages)
[PATCH V2] selinux: Add SCTP support
2017-12-07 23:37 UTC (5+ messages)
[PATCH] integrity: get rid of unneeded initializations in integrity_iint_cache entries
2017-12-07 15:16 UTC (6+ messages)
[PATCH v6 0/2] Fix corner cases with disabling CLKRUN in tpm_tis
2017-12-07 1:35 UTC (7+ messages)
` [PATCH v6 1/2] tpm_tis: Move ilb_base_addr to tpm_tis_data
` [PATCH v6 2/2] tpm: Keep CLKRUN enabled throughout the duration of transmit_cmd()
[PATCH] security: keys: remove redundant assignment to key_ref
2017-12-07 0:49 UTC (5+ messages)
[PATCH] security: Export few symbols referred by other modules
2017-12-07 0:10 UTC (7+ messages)
[PATCH 29/45] security: apparmor: remove duplicate includes
2017-12-06 17:35 UTC
[PATCH 00/12] ima: measure digest lists instead of individual files
2017-12-06 9:22 UTC (4+ messages)
` [PATCH 12/12] ima: added Documentation/security/IMA-digest-lists.txt
` [Linux-ima-devel] "
[PATCH v2 00/15] ima: digest list feature
2017-12-06 9:13 UTC (3+ messages)
[PATCH 0/9] LSM: Stacking for major security modules - Based on 4.14-rc2
2017-12-05 16:29 UTC (6+ messages)
` [PATCH 5/9] LSM: Manage remaining security blobs
[PATCH v3] ima: log message to module appraisal error
2017-12-05 13:35 UTC
[PATCH v2] ima: log message to module appraisal error
2017-12-05 13:35 UTC
[PATCH v2] ima: log message to module appraisal error
2017-12-04 23:35 UTC (2+ messages)
[PATCH] ima: log message to module appraisal error
2017-12-04 19:54 UTC
[PATCH] treewide: remove duplicate includes
2017-12-04 19:21 UTC (6+ messages)
[PATCH tip/core/rcu 15/21] keyring: Remove now-redundant smp_read_barrier_depends()
2017-12-04 18:54 UTC (3+ messages)
[PATCHv5 1/1] ima: re-introduce own integrity cache lock
2017-12-04 16:30 UTC (5+ messages)
linux-security move to 4.15.0-rc2?
2017-12-04 12:30 UTC (2+ messages)
[PATCH 4/4] selinux: Add SCTP support
2017-12-04 11:40 UTC (4+ messages)
[RFC][PATCH v2 0/9] ima: integrity models for appraised files
2017-12-01 18:06 UTC (13+ messages)
` [RFC][PATCH v2 1/9] ima: pass filename to ima_rdwr_violation_check()
` [RFC][PATCH v2 2/9] ima: preserve flags in ima_inode_post_setattr() if file must be appraised
` [RFC][PATCH v2 3/9] ima: preserve iint flags if security.ima update is successful
` [RFC][PATCH v2 4/9] ima: introduce ima_mk_null_file()
` [RFC][PATCH v2 5/9] ima: measure/appraise/audit inherited file descriptors
` [RFC][PATCH v2 6/9] ima: enforce the Biba strict policy on appraised files
` [RFC][PATCH v2 7/9] ima: enforce the Biba low watermark for objects "
` [RFC][PATCH v2 8/9] ima: introduce policy action try_appraise
` [RFC][PATCH v2 9/9] ima: don't measure files with valid appraisal status
[PATCH v5 next 0/5] Improve Module autoloading infrastructure
2017-12-01 15:22 UTC (38+ messages)
` [PATCH v5 next 2/5] modules:capabilities: add cap_kernel_module_request() permission check
` [PATCH v5 next 3/5] modules:capabilities: automatic module loading restriction
` [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules
` [kernel-hardening] "
[BUG] kernel stack corruption during/after Netlabel error
2017-12-01 1:55 UTC (14+ messages)
[PATCH v5 next 1/5] modules:capabilities: add request_module_cap()
2017-11-30 17:17 UTC (11+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).