Show patches with: Archived = No       |   7144 patches
« 1 2 3 471 72 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[GIT,PULL] SELinux fixes for v5.18 (#1) [GIT,PULL] SELinux fixes for v5.18 (#1) - - - --- 2022-05-18 Paul Moore New
selinux: add __randomize_layout to selinux_audit_data selinux: add __randomize_layout to selinux_audit_data - - - --- 2022-05-18 GONG, Ruiqi New
[RFC,v2,4/4] libselinux: check for truncations Untitled series #642403 - - - --- 2022-05-17 Christian Göttsche New
[2/2] libselinux: restorecon: avoid printing NULL pointer [1/2] libselinux: restorecon: add fallback for pre 3.6 Linux - - - --- 2022-05-17 Christian Göttsche New
[1/2] libselinux: restorecon: add fallback for pre 3.6 Linux [1/2] libselinux: restorecon: add fallback for pre 3.6 Linux - - - --- 2022-05-17 Christian Göttsche New
ci: declare git repository a safe directory ci: declare git repository a safe directory 1 - - --- 2022-05-17 Christian Göttsche Accepted
[userspace,v4,2/2] libsepol,checkpolicy: add support for self keyword in type transitions Support the 'self' keyword in type transitions - - - --- 2022-05-13 Ondrej Mosnacek Accepted
[userspace,v4,1/2] libsepol/cil: add support for self keyword in type transitions Support the 'self' keyword in type transitions - - - --- 2022-05-13 Ondrej Mosnacek Accepted
[RFC,4/4] libselinux: restorecon: pin file to avoid TOCTOU issues [RFC] libselinux: emulate O_PATH support in fgetfilecon/fsetfilecon 1 - - --- 2022-05-11 Christian Göttsche Accepted
[RFC,3/4] libselinux: restorecon: forward error if not ENOENT [RFC] libselinux: emulate O_PATH support in fgetfilecon/fsetfilecon 1 - - --- 2022-05-11 Christian Göttsche Accepted
[RFC,2/4] libselinux: restorecon: misc tweaks [RFC] libselinux: emulate O_PATH support in fgetfilecon/fsetfilecon 1 - - --- 2022-05-11 Christian Göttsche Accepted
libselinux: preserve errno in selinux_log() libselinux: preserve errno in selinux_log() 1 - - --- 2022-05-11 Christian Göttsche Accepted
[RFC,4/4] libselinux: check for truncations [RFC,1/4] libselinux: simplify policy path logic to avoid uninitialized read - - - --- 2022-05-10 Christian Göttsche Superseded
[RFC,3/4] libselinux: introduce strlcpy [RFC,1/4] libselinux: simplify policy path logic to avoid uninitialized read - - - --- 2022-05-10 Christian Göttsche New
[RFC,2/4] libselinux: add header guard for internal header [RFC,1/4] libselinux: simplify policy path logic to avoid uninitialized read - - - --- 2022-05-10 Christian Göttsche New
[RFC,1/4] libselinux: simplify policy path logic to avoid uninitialized read [RFC,1/4] libselinux: simplify policy path logic to avoid uninitialized read 1 - - --- 2022-05-10 Christian Göttsche New
libselinux: free memory in error branch libselinux: free memory in error branch 1 - - --- 2022-05-10 Christian Göttsche Accepted
[userspace,v3,2/2] libsepol,checkpolicy: add support for self keyword in type transitions Support the 'self' keyword in type transitions - - - --- 2022-05-10 Ondrej Mosnacek Accepted
[userspace,v3,1/2] libsepol/cil: add support for self keyword in type transitions Support the 'self' keyword in type transitions - - - --- 2022-05-10 Ondrej Mosnacek Accepted
gettext: set _ on module level instead of builtins namespace gettext: set _ on module level instead of builtins namespace 1 - - --- 2022-05-06 Vit Mojzis Accepted
[RFC] libselinux: emulate O_PATH support in fgetfilecon/fsetfilecon [RFC] libselinux: emulate O_PATH support in fgetfilecon/fsetfilecon 1 - - --- 2022-05-05 Christian Göttsche Accepted
libselinux/utils: print errno on failure libselinux/utils: print errno on failure 1 - - --- 2022-05-05 Christian Göttsche Accepted
libselinux: update man page of setfilecon(3) family about context parameter libselinux: update man page of setfilecon(3) family about context parameter 1 - - --- 2022-05-05 Christian Göttsche Accepted
gui: Make sure sepolicy calls are translated properly gui: Make sure sepolicy calls are translated properly - - - --- 2022-05-03 Vit Mojzis Changes Requested
[v2,5/5] setfiles: introduce the -C option for distinguishing file tree walk errors selinux_restorecon(3), setfiles(8): skip relabeling errors - - - --- 2022-05-03 Laszlo Ersek Accepted
[v2,4/5] selinux_restorecon: introduce SELINUX_RESTORECON_COUNT_ERRORS selinux_restorecon(3), setfiles(8): skip relabeling errors - - - --- 2022-05-03 Laszlo Ersek Accepted
[v2,3/5] setfiles: remove useless "iamrestorecon" checks in option parsing selinux_restorecon(3), setfiles(8): skip relabeling errors - 1 - --- 2022-05-03 Laszlo Ersek Accepted
[v2,2/5] setfiles: remove useless assignment and comment (after RHBZ#1926386) selinux_restorecon(3), setfiles(8): skip relabeling errors - - - --- 2022-05-03 Laszlo Ersek Accepted
[v2,1/5] setfiles: fix up inconsistent indentation selinux_restorecon(3), setfiles(8): skip relabeling errors - - - --- 2022-05-03 Laszlo Ersek Accepted
libselinux/utils/getsebool: add options to display en-/disabled booleans libselinux/utils/getsebool: add options to display en-/disabled booleans - - - --- 2022-04-28 Christian Göttsche New
[for-3.5,5/5] setfiles: introduce the -C option for distinguishing file tree walk errors selinux_restorecon(3), setfiles(8): skip relabeling errors - - - --- 2022-04-28 Laszlo Ersek Superseded
[for-3.5,4/5] selinux_restorecon: introduce SELINUX_RESTORECON_COUNT_ERRORS selinux_restorecon(3), setfiles(8): skip relabeling errors - - - --- 2022-04-28 Laszlo Ersek Superseded
[for-3.5,3/5] setfiles: remove useless "iamrestorecon" checks in option parsing selinux_restorecon(3), setfiles(8): skip relabeling errors - 1 - --- 2022-04-28 Laszlo Ersek Superseded
[for-3.5,2/5] setfiles: remove useless assignment and comment (after RHBZ#1926386) selinux_restorecon(3), setfiles(8): skip relabeling errors - - - --- 2022-04-28 Laszlo Ersek Superseded
[for-3.5,1/5] setfiles: fix up inconsistent indentation selinux_restorecon(3), setfiles(8): skip relabeling errors - - - --- 2022-04-28 Laszlo Ersek Superseded
checkpolicy: mention class name on invalid permission checkpolicy: mention class name on invalid permission 1 - - --- 2022-04-26 Christian Göttsche Accepted
[userspace,v2,2/2] libsepol,checkpolicy: add support for self keyword in type transitions Support the 'self' keyword in type transitions - - - --- 2022-04-26 Ondrej Mosnacek Accepted
[userspace,v2,1/2] libsepol/cil: add support for self keyword in type transitions Support the 'self' keyword in type transitions - - - --- 2022-04-26 Ondrej Mosnacek Accepted
[userspace,2/2] libsepol,checkpolicy: add support for self keyword in type transitions Support the 'self' keyword in type transitions - - - --- 2022-04-22 Ondrej Mosnacek Superseded
[userspace,1/2] libsepol/cil: add support for self keyword in type transitions Support the 'self' keyword in type transitions - - - --- 2022-04-22 Ondrej Mosnacek Superseded
[v34,29/29] AppArmor: Remove the exclusive flag [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 1 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,28/29] LSM: Add /proc attr entry for full LSM context [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - 1 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,27/29] Audit: Add record for multiple object contexts [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,26/29] Audit: Add record for multiple task security contexts [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,25/29] Audit: Allow multiple records in an audit_buffer [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,24/29] LSM: Add a function to report multiple LSMs [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,23/29] Audit: Create audit_stamp structure [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,22/29] Audit: Keep multiple LSM data in audit_names [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,21/29] LSM: Extend security_secid_to_secctx to include module selection [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,20/29] binder: Pass LSM identifier for confirmation [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,19/29] NET: Store LSM netlabel data in a lsmblob [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,18/29] LSM: security_secid_to_secctx in netlink netfilter [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 3 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,17/29] LSM: Use lsmcontext in security_inode_getsecctx [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 3 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,16/29] LSM: Use lsmcontext in security_secid_to_secctx [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,15/29] LSM: Ensure the correct LSM context releaser [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 3 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,14/29] LSM: Specify which LSM to display [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,13/29] LSM: Use lsmblob in security_cred_getsecid [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,12/29] LSM: Use lsmblob in security_inode_getsecid [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,11/29] LSM: Use lsmblob in security_current_getsecid [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,10/29] LSM: Use lsmblob in security_ipc_getsecid [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,09/29] LSM: Use lsmblob in security_secid_to_secctx [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 1 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,08/29] LSM: Use lsmblob in security_secctx_to_secid [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 1 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,07/29] LSM: Use lsmblob in security_kernel_act_as [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,06/29] LSM: Use lsmblob in security_audit_rule_match [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,05/29] IMA: avoid label collisions with stacked LSMs [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - - - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,04/29] LSM: provide lsm name and id slot mappings [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 1 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,03/29] LSM: Add the lsmblob data structure. [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule - 1 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,02/29] LSM: Infrastructure management of the sock security [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 2 2 - --- 2022-04-15 Casey Schaufler Not Applicable
[v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule [v34,01/29] integrity: disassociate ima_filter_rule from security_audit_rule 1 - - --- 2022-04-15 Casey Schaufler Not Applicable
[5/5] libsemanage/tests: Remove unused functions [1/5] libsepol/test Include policydb.h header for policydb_t declaration - - - --- 2022-04-14 James Carter Accepted
[4/5] libsemanage/tests: Declare file local functions as static [1/5] libsepol/test Include policydb.h header for policydb_t declaration - - - --- 2022-04-14 James Carter Accepted
[3/5] libsepol/test: Declare file local functions as static [1/5] libsepol/test Include policydb.h header for policydb_t declaration - - - --- 2022-04-14 James Carter Accepted
[2/5] libsepol/test: Include paired headers for prototypes [1/5] libsepol/test Include policydb.h header for policydb_t declaration - - - --- 2022-04-14 James Carter Accepted
[1/5] libsepol/test Include policydb.h header for policydb_t declaration [1/5] libsepol/test Include policydb.h header for policydb_t declaration 1 - - --- 2022-04-14 James Carter Accepted
libsepol/tests: adjust IPv6 netmasks libsepol/tests: adjust IPv6 netmasks 1 - - --- 2022-04-13 Christian Göttsche Accepted
[3/3] libselinux: correctly hash specfiles larger than 4G [1/3] libselinux: correct parameter type in selabel_open(3) - - - --- 2022-04-13 Christian Göttsche Accepted
[2/3] libselinux: free memory on selabel_open(3) failure [1/3] libselinux: correct parameter type in selabel_open(3) - - - --- 2022-04-13 Christian Göttsche Accepted
[1/3] libselinux: correct parameter type in selabel_open(3) [1/3] libselinux: correct parameter type in selabel_open(3) 1 - - --- 2022-04-13 Christian Göttsche Accepted
[HEADS,UP,MISSING] Update python library and binding versions to 3.4-rc1 [HEADS,UP,MISSING] Update python library and binding versions to 3.4-rc1 - - - --- 2022-04-13 Petr Lautrbach Superseded
[5/5] libsemanage: avoid double fclose [1/5] libsepol/cil: declare file local function pointer static - - - --- 2022-04-08 Christian Göttsche Accepted
[4/5] libselinux: limit has buffer size [1/5] libsepol/cil: declare file local function pointer static - - - --- 2022-04-08 Christian Göttsche Accepted
[3/5] libsepol: drop unnecessary const discarding casts [1/5] libsepol/cil: declare file local function pointer static - - - --- 2022-04-08 Christian Göttsche Accepted
[2/5] libsepol: check correct pointer for oom [1/5] libsepol/cil: declare file local function pointer static - - - --- 2022-04-08 Christian Göttsche Accepted
[1/5] libsepol/cil: declare file local function pointer static [1/5] libsepol/cil: declare file local function pointer static 1 - - --- 2022-04-08 Christian Göttsche Accepted
Correct misc typos Correct misc typos 1 - - --- 2022-04-08 Christian Göttsche Accepted
[v3] setfiles.8: -q is deprecated and has no effect [v3] setfiles.8: -q is deprecated and has no effect 1 - - --- 2022-04-08 Petr Lautrbach Accepted
policycoreutils: drop usage of egrep in fixfiles policycoreutils: drop usage of egrep in fixfiles 1 - - --- 2022-04-05 Christian Göttsche Accepted
[v2,6/6] Enable missing prototypes [v2,1/6] libsepol/cil: declare file local functions static - - - --- 2022-04-05 Christian Göttsche New
[v2,5/6] libsemanage: ignore missing prototypes in swig generated code [v2,1/6] libsepol/cil: declare file local functions static - - - --- 2022-04-05 Christian Göttsche Accepted
[v2,4/6] libsepol/cil: comment out unused function __cil_verify_rule [v2,1/6] libsepol/cil: declare file local functions static 1 - - --- 2022-04-05 Christian Göttsche Accepted
[v2,3/6] libsepol/cil: post process pirqcon rules [v2,1/6] libsepol/cil: declare file local functions static - - - --- 2022-04-05 Christian Göttsche Accepted
[v2,2/6] libsepol/cil: drop unused function cil_tree_error [v2,1/6] libsepol/cil: declare file local functions static - - - --- 2022-04-05 Christian Göttsche Accepted
[v2,1/6] libsepol/cil: declare file local functions static [v2,1/6] libsepol/cil: declare file local functions static - - - --- 2022-04-05 Christian Göttsche Accepted
[v2] libselinux/utils: check for valid contexts to improve error causes [v2] libselinux/utils: check for valid contexts to improve error causes 1 - - --- 2022-04-05 Christian Göttsche Accepted
[v2] setfiles.8: -q is deprecated and has no effect [v2] setfiles.8: -q is deprecated and has no effect - - - --- 2022-04-05 Petr Lautrbach Accepted
[v2] libsepol: Replace calls to mallocarray() with calls to calloc() [v2] libsepol: Replace calls to mallocarray() with calls to calloc() - - - --- 2022-04-01 James Carter Accepted
[v2,3/3] mcstrans: Fir RESOURCE_LEAK and USE_AFTER_FREE coverity scan defects [v2] libsemanage: Fall back to semanage_copy_dir when rename() fails - - - --- 2022-04-01 Petr Lautrbach Accepted
[3/3] mcstrans: Fir RESOURCE_LEAK and USE_AFTER_FREE coverity scan defects [1/3] libsemanage: Fix USE_AFTER_FREE (CWE-672) in semanage_direct_get_module_info() - - - --- 2022-04-01 Petr Lautrbach Accepted
[2/3] semodule_package: Close leaking fd [1/3] libsemanage: Fix USE_AFTER_FREE (CWE-672) in semanage_direct_get_module_info() - - - --- 2022-04-01 Petr Lautrbach Accepted
[1/3] libsemanage: Fix USE_AFTER_FREE (CWE-672) in semanage_direct_get_module_info() [1/3] libsemanage: Fix USE_AFTER_FREE (CWE-672) in semanage_direct_get_module_info() 1 - - --- 2022-04-01 Petr Lautrbach Accepted
« 1 2 3 471 72 »