messages from 2019-04-09 22:35:25 to 2019-04-18 03:53:08 UTC [more...]
[PATCH v10 00/12] Appended signatures support for IMA appraisal
2019-04-18 3:51 UTC (12+ messages)
` [PATCH v10 01/12] MODSIGN: Export module signature definitions
` [PATCH v10 02/12] PKCS#7: Refactor verify_pkcs7_signature()
` [PATCH v10 03/12] PKCS#7: Introduce pkcs7_get_digest()
` [PATCH v10 04/12] integrity: Introduce struct evm_xattr
` [PATCH v10 05/12] integrity: Select CONFIG_KEYS instead of depending on it
` [PATCH v10 06/12] ima: Use designated initializers for struct ima_event_data
` [PATCH v10 07/12] ima: Add modsig appraise_type option for module-style appended signatures
` [PATCH v10 09/12] ima: Implement support "
` [PATCH v10 10/12] ima: Collect modsig
` [PATCH v10 11/12] ima: Define ima-modsig template
` [PATCH v10 12/12] ima: Store the measurement again when appraising a modsig
kernel BUG at kernel/cred.c:434!
2019-04-18 2:49 UTC (17+ messages)
[RFC PATCH v9 03/13] mm: Add support for eXclusive Page Frame Ownership (XPFO)
2019-04-17 23:52 UTC (13+ messages)
[PATCH] mm: security: introduce CONFIG_INIT_HEAP_ALL
2019-04-17 17:04 UTC (13+ messages)
[RFC PATCH v1 0/5] Add support for O_MAYEXEC
2019-04-17 15:04 UTC (9+ messages)
` [RFC PATCH v1 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
[PATCH 00/57] Convert files to ReST
2019-04-17 14:36 UTC (3+ messages)
` [PATCH 23/57] docs: netlabel: convert it "
fanotify and LSM path hooks
2019-04-17 14:14 UTC (11+ messages)
[PATCH v20 16/28] x86/sgx: Add provisioning
2019-04-17 10:39 UTC
crypto: Kernel memory overwrite attempt detected to spans multiple pages
2019-04-17 9:54 UTC (27+ messages)
` [PATCH] crypto: testmgr - allocate buffers with __GFP_COMP
[PATCH] apparmor: fix spelling mistake "immutible" -> "immutable"
2019-04-16 19:56 UTC (2+ messages)
[PATCH v2 0/3] Refactor memory initialization hardening
2019-04-16 13:56 UTC (10+ messages)
` [PATCH v2 1/3] security: Create "kernel hardening" config area
` [PATCH v2 2/3] security: Move stackleak config to Kconfig.hardening
` [PATCH v2 3/3] security: Implement Clang's stack initialization
[PATCH V32 0/27] Lockdown patches for 5.2
2019-04-16 8:40 UTC (3+ messages)
` [PATCH V32 01/27] Add the ability to lock down access to the running kernel image
[PULL] Smack: Changes for 5.2
2019-04-16 0:33 UTC (2+ messages)
[PATCH 1/3] selinux: Check address length before reading address family
2019-04-15 16:46 UTC (5+ messages)
` [PATCH 2/3] smack: "
` [PATCH 3/3] tomoyo: "
[PATCH 1/2] apparmor: Use a memory pool instead per-CPU caches
2019-04-15 10:50 UTC (2+ messages)
[PATCH] TCG2 log support build fixes for non-x86_64
2019-04-15 8:47 UTC (2+ messages)
[GIT PULL] linux-integrity patches for Linux 5.2
2019-04-12 22:22 UTC (2+ messages)
[PATCH] tomoyo: Change pathname calculation for read-only filesystems
2019-04-12 11:09 UTC (3+ messages)
[PATCH (resend)] tomoyo: Add a kernel config option for fuzzing testing
2019-04-12 11:04 UTC
[PATCH] net: socket: Always initialize family field at move_addr_to_kernel()
2019-04-12 0:24 UTC (4+ messages)
[PATCH v2 09/10] LSM: SafeSetID: verify transitive constrainedness
2019-04-11 20:38 UTC (2+ messages)
[PATCH v2 08/10] LSM: SafeSetID: add read handler
2019-04-11 20:37 UTC (2+ messages)
[PATCH v4 0/3] RFC: introduce CONFIG_INIT_ALL_MEMORY
2019-04-11 17:40 UTC (8+ messages)
` [PATCH v4 1/3] initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
` [PATCH v4 2/3] initmem: introduce CONFIG_INIT_ALL_HEAP
` [PATCH 3/3] net: make sk_prot_alloc() work with CONFIG_INIT_ALL_HEAP
[PATCH 0/3] Kconfig: Refactor memory initialization hardening
2019-04-11 17:07 UTC (9+ messages)
` [PATCH 1/3] Kconfig: Create "kernel hardening" config area
` [PATCH 2/3] kbuild: Move stackleak config to Kconfig.hardening
` [PATCH 3/3] kbuild: Implement Clang's stack initialization
[PATCH] security: inode: fix a missing check for securityfs_create_file
2019-04-10 22:00 UTC (5+ messages)
KASAN: use-after-free Read in path_lookupat
2019-04-10 19:44 UTC (2+ messages)
[PATCH 07/10] LSM: SafeSetID: rewrite userspace API to atomic updates
2019-04-10 18:20 UTC (4+ messages)
[PATCH 09/10] LSM: SafeSetID: verify transitive constrainedness
2019-04-10 18:17 UTC (4+ messages)
[PATCH 08/10] LSM: SafeSetID: add read handler
2019-04-10 17:42 UTC (3+ messages)
[PATCH] Yama: mark function as static
2019-04-10 17:37 UTC (2+ messages)
[PATCH] keys: safe concurrent user->{session,uid}_keyring access
2019-04-10 17:31 UTC (2+ messages)
[PATCH] security: don't use RCU accessors for cred->session_keyring
2019-04-10 17:29 UTC (2+ messages)
[PATCH 10/10] LSM: SafeSetID: fix use of literal -1 in capable hook
2019-04-10 17:28 UTC (2+ messages)
[PATCH] Yama: mark local symbols as static
2019-04-10 17:26 UTC (2+ messages)
[PATCH v5 1/2] LSM: SafeSetID: gate setgid transitions
2019-04-10 17:21 UTC (5+ messages)
[PATCH 00/59] LSM: Module stacking for AppArmor
2019-04-10 17:18 UTC (9+ messages)
` [PATCH 27/59] NET: Store LSM access information in the socket blob for UDS
` [PATCH 58/59] LSM: Specify which LSM to display with /proc/self/attr/display
[PATCH 06/10] LSM: SafeSetID: fix userns handling in securityfs
2019-04-10 17:16 UTC (2+ messages)
[PATCH 05/10] LSM: SafeSetID: refactor policy parsing
2019-04-10 17:15 UTC (2+ messages)
[PATCH 04/10] LSM: SafeSetID: refactor safesetid_security_capable()
2019-04-10 17:13 UTC (2+ messages)
[PATCH 03/10] LSM: SafeSetID: refactor policy hash table
2019-04-10 17:12 UTC (2+ messages)
[PATCH 02/10] LSM: SafeSetID: fix check for setresuid(new1, new2, new3)
2019-04-10 17:11 UTC (2+ messages)
[PATCH 01/10] LSM: SafeSetID: fix pr_warn() to include newline
2019-04-10 17:09 UTC (2+ messages)
[GIT PULL] apparmor regression fix for v5.1-rc5
2019-04-10 16:50 UTC (2+ messages)
[PATCH v3 bpf-next 00/21] bpf: Sysctl hook
2019-04-09 23:34 UTC (8+ messages)
[PATCH 1/1] Smack: Create smack_rule cache to optimize memory usage
2019-04-09 23:30 UTC (2+ messages)
[PATCH 1/1] Smack :- In this patch, global rule list has been removed. Now all smack rules will be read using "smack_known_list". This list contains all the smack labels and internally each smack label structure maintains the list of smack rules corresponding to that smack label. So there is no need to maintain extra list
2019-04-09 23:29 UTC (2+ messages)
[ANNOUNCE][CFP] Linux Security Summit North America 2019
2019-04-09 22:34 UTC
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).