Show patches with: Archived = No       |   9296 patches
« 1 2 3 492 93 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
sepolgen: Use key function in sort() - - - --- 2015-11-13 Petr Lautrbach Accepted
[v3] selinux: rate-limit unrecognized netlink message warnings in selinux_nlmsg_perm() - - - --- 2015-11-13 Vladis Dronov pcmoore Accepted
policycoreutils/sandbox: Fix sandbox to propagate specified MCS/MLS Security Level. - - - --- 2015-11-14 Miroslav Grepl Accepted
[selinux-testsuite,v2,3/4] mmap/mprotect_heap: make sure memory is allocated from heap - - - --- 2015-11-16 Jan Stancek pcmoore Accepted
policycoreutils: improve sepolicy command line interface - - - --- 2015-11-16 Petr Lautrbach Accepted
policycoreutils: Require at least one argument for 'semanage permissive -d' - - - --- 2015-11-17 Petr Lautrbach Accepted
[v3,1/7] block_dev: Support checking inode permissions in lookup_bdev() - - - --- 2015-11-17 Seth Forshee Not Applicable
[v3,2/7] block_dev: Check permissions towards block device inode when mounting - - - --- 2015-11-17 Seth Forshee Not Applicable
[v3,3/7] mtd: Check permissions towards mtd block device inode when mounting - - - --- 2015-11-17 Seth Forshee Not Applicable
[v3,4/7] fs: Treat foreign mounts as nosuid - - - --- 2015-11-17 Seth Forshee Not Applicable
[v3,5/7] selinux: Add support for unprivileged mounts from user namespaces - - - --- 2015-11-17 Seth Forshee Not Applicable
[v3,6/7] userns: Replace in_userns with current_in_userns - - - --- 2015-11-17 Seth Forshee Not Applicable
[v3,7/7] Smack: Handle labels consistently in untrusted mounts - - - --- 2015-11-17 Seth Forshee Not Applicable
libsepol: Fully expand neverallowxperm rules - - - --- 2015-11-21 Richard Haines Accepted
libselinux: Correct line count for property and service contexts files - - - --- 2015-11-23 Richard Haines Accepted
(Userspace) AVC denial generated even if allowed by the policy? - - - --- 2015-11-23 Laurent Bigonville Rejected
(Userspace) AVC denial generated even if allowed by the policy? - - - --- 2015-11-23 Laurent Bigonville Not Applicable
selinux: fix bug in conditional rules handling - - - --- 2015-11-23 Stephen Smalley Accepted
policycoreutils: replace string.join() with str.join() - - - --- 2015-11-25 Petr Lautrbach Accepted
policycoreutils: fix 'semanage permissive -l' subcommand - - - --- 2015-11-30 Petr Lautrbach Accepted
[selinux-testsuite] net_socket: replace md5 with sha1 in ipsec-load - - - --- 2015-12-01 Jan Stancek Accepted
[1/2] libsepol/cil: Add support for neverallowx - - - --- 2015-12-01 Steve Lawrence Accepted
[2/2] secilc/docs: Add documentation for neverallowx rules - - - --- 2015-12-01 Steve Lawrence Accepted
libsepol/cil: Remove duplicated 'if' condition in cil_tree - - - --- 2015-12-01 Steve Lawrence Accepted
[01/19] block_dev: Support checking inode permissions in lookup_bdev() - - - --- 2015-12-02 Seth Forshee Superseded
[02/19] block_dev: Check permissions towards block device inode when mounting - - - --- 2015-12-02 Seth Forshee Superseded
[03/19] fs: Treat foreign mounts as nosuid - - - --- 2015-12-02 Seth Forshee Superseded
[04/19] selinux: Add support for unprivileged mounts from user namespaces - - - --- 2015-12-02 Seth Forshee Superseded
[05/19] userns: Replace in_userns with current_in_userns - - - --- 2015-12-02 Seth Forshee Superseded
[06/19] Smack: Handle labels consistently in untrusted mounts - - - --- 2015-12-02 Seth Forshee Superseded
[07/19] fs: Check for invalid i_uid in may_follow_link() - - - --- 2015-12-02 Seth Forshee Superseded
[08/19] cred: Reject inodes with invalid ids in set_create_file_as() - - - --- 2015-12-02 Seth Forshee Superseded
[09/19] fs: Refuse uid/gid changes which don't map into s_user_ns - - - --- 2015-12-02 Seth Forshee Superseded
[10/19] fs: Update posix_acl support to handle user namespace mounts - - - --- 2015-12-02 Seth Forshee Superseded
[11/19] fs: Ensure the mounter of a filesystem is privileged towards its inodes - - - --- 2015-12-02 Seth Forshee Superseded
[12/19] fs: Don't remove suid for CAP_FSETID in s_user_ns - - - --- 2015-12-02 Seth Forshee Superseded
[13/19] fs: Allow superblock owner to access do_remount_sb() - - - --- 2015-12-02 Seth Forshee Superseded
[14/19] fs: Permit FIBMAP for users with CAP_SYS_RAWIO in s_user_ns - - - --- 2015-12-02 Seth Forshee Superseded
[15/19] capabilities: Allow privileged user in s_user_ns to set file caps - - - --- 2015-12-02 Seth Forshee Superseded
[16/19] fuse: Add support for pid namespaces - - - --- 2015-12-02 Seth Forshee Superseded
[17/19] fuse: Support fuse filesystems outside of init_user_ns - - - --- 2015-12-02 Seth Forshee Superseded
[18/19] fuse: Restrict allow_other to the superblock's namespace or a descendant - - - --- 2015-12-02 Seth Forshee Superseded
[19/19] fuse: Allow user namespace mounts - - - --- 2015-12-02 Seth Forshee Superseded
libsepol/cil: Validate extended avrules and permissionxs - - - --- 2015-12-07 Steve Lawrence Accepted
[v2,01/18] block_dev: Support checking inode permissions in lookup_bdev() - - - --- 2015-12-07 Seth Forshee Superseded
[v2,02/18] block_dev: Check permissions towards block device inode when mounting - - - --- 2015-12-07 Seth Forshee Superseded
[v2,03/18] fs: Treat foreign mounts as nosuid - - - --- 2015-12-07 Seth Forshee Superseded
[v2,04/18] selinux: Add support for unprivileged mounts from user namespaces - - - --- 2015-12-07 Seth Forshee Superseded
[v2,05/18] userns: Replace in_userns with current_in_userns - - - --- 2015-12-07 Seth Forshee Superseded
[v2,06/18] Smack: Handle labels consistently in untrusted mounts - - - --- 2015-12-07 Seth Forshee Superseded
[v2,07/18] fs: Check for invalid i_uid in may_follow_link() - - - --- 2015-12-07 Seth Forshee Superseded
[v2,08/18] cred: Reject inodes with invalid ids in set_create_file_as() - - - --- 2015-12-07 Seth Forshee Superseded
[v2,09/18] fs: Refuse uid/gid changes which don't map into s_user_ns - - - --- 2015-12-07 Seth Forshee Superseded
[v2,10/18] fs: Update posix_acl support to handle user namespace mounts - - - --- 2015-12-07 Seth Forshee Superseded
[v2,11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes - - - --- 2015-12-07 Seth Forshee Superseded
[v2,12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns - - - --- 2015-12-07 Seth Forshee Superseded
[v2,13/18] fs: Allow superblock owner to access do_remount_sb() - - - --- 2015-12-07 Seth Forshee Superseded
[v2,14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs - - - --- 2015-12-07 Seth Forshee Superseded
[v2,15/18] fuse: Add support for pid namespaces - - - --- 2015-12-07 Seth Forshee Superseded
[v2,16/18] fuse: Support fuse filesystems outside of init_user_ns - - - --- 2015-12-07 Seth Forshee Superseded
[v2,17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant - - - --- 2015-12-07 Seth Forshee Superseded
[v2,18/18] fuse: Allow user namespace mounts - - - --- 2015-12-07 Seth Forshee Superseded
libselinux: Verify context input to funtions to make sure the context field is not null. - - - --- 2015-12-09 Petr Lautrbach Rejected
libselinux/man: Add information about thread specific on setfscreatecon - - - --- 2015-12-09 Petr Lautrbach Accepted
libselinux: Don't wrap rpm_execcon with DISABLE_RPM - - - --- 2015-12-10 Petr Lautrbach Accepted
secilc/docs: Convert DocBook documentation into github markdown - - - --- 2015-12-11 Yuli Khodorkovskiy Changes Requested
policycoreutils/chcat: Add a fallback in case os.getlogin() returns nothing - - - --- 2015-12-13 Laurent Bigonville Accepted
[v2] secilc/docs: Convert DocBook documentation into github markdown - - - --- 2015-12-15 Yuli Khodorkovskiy Accepted
[RFC,01/17] netlabel: Mark rcu pointers with __rcu. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,02/17] netlabel: Add an address family to domain hash entries. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,03/17] netlabel: Initial support for the CALIPSO netlink protocol. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,04/17] netlabel: Add support for querying a CALIPSO DOI. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,05/17] netlabel: Add support for enumerating the CALIPSO DOI list. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,06/17] netlabel: Add support for creating a CALIPSO protocol domain mapping. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,07/17] netlabel: Add support for removing a CALIPSO DOI. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,08/17] ipv6: Add ipv6_renew_options_kern() that accepts a kernel mem pointer. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,09/17] netlabel: Move bitmap manipulation functions to the NetLabel core. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,10/17] calipso: Set the calipso socket label to match the secattr. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,11/17] netlabel: Prevent setsockopt() from changing the hop-by-hop option. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,12/17] ipv6: Allow request socks to contain IPv6 options. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,13/17] calipso: Allow request sockets to be relabelled by the lsm. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,14/17] calipso: Allow the lsm to label the skbuff directly. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,15/17] netlabel: Pass a family parameter to netlbl_skbuff_err(). - - - --- 2015-12-22 Huw Davies Superseded
[RFC,16/17] calipso: Add validation of CALIPSO option. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,17/17] calipso: Add a label cache. - - - --- 2015-12-22 Huw Davies Superseded
policycoreutils: semanage: list reserver_port_t - - - --- 2016-01-04 Petr Lautrbach Accepted
update deps and change yum to dnf - - - --- 2016-01-04 Joshua Brindle Rejected
[RESEND,v2,01/18] block_dev: Support checking inode permissions in lookup_bdev() - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,02/18] block_dev: Check permissions towards block device inode when mounting - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,03/18] fs: Treat foreign mounts as nosuid - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,04/18] selinux: Add support for unprivileged mounts from user namespaces - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,05/18] userns: Replace in_userns with current_in_userns - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,06/18] Smack: Handle labels consistently in untrusted mounts - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,07/18] fs: Check for invalid i_uid in may_follow_link() - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,08/18] cred: Reject inodes with invalid ids in set_create_file_as() - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,09/18] fs: Refuse uid/gid changes which don't map into s_user_ns - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,10/18] fs: Update posix_acl support to handle user namespace mounts - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,13/18] fs: Allow superblock owner to access do_remount_sb() - - - --- 2016-01-04 Seth Forshee Superseded
« 1 2 3 492 93 »