Show patches with: Archived = No       |   6579 patches
« 1 2 3 465 66 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[SYSTEMD,1/7] selinux: add function name to audit data Re-add SELinux checks for unit install operations - - - --- 2021-08-05 Christian Göttsche Handled Elsewhere
[SYSTEMD,2/7] selinux: improve debug log format Re-add SELinux checks for unit install operations - - - --- 2021-08-05 Christian Göttsche Handled Elsewhere
[SYSTEMD,3/7] selinux: mark _mac_selinux_generic_access_check with leading underscore Re-add SELinux checks for unit install operations - - - --- 2021-08-05 Christian Göttsche Handled Elsewhere
[SYSTEMD,4/7] core: add support for MAC checks on unit install operations Re-add SELinux checks for unit install operations - - - --- 2021-08-05 Christian Göttsche Handled Elsewhere
[SYSTEMD,5/7] core: implement the sd-bus generic callback for SELinux Re-add SELinux checks for unit install operations - - - --- 2021-08-05 Christian Göttsche Handled Elsewhere
[SYSTEMD,6/7] core: avoid bypasses in D-BUS SELinux filter Re-add SELinux checks for unit install operations - - - --- 2021-08-05 Christian Göttsche Handled Elsewhere
[SYSTEMD,7/7] core: tweak job_type_to_access_method SELinux permissions Re-add SELinux checks for unit install operations - - - --- 2021-08-05 Christian Göttsche Handled Elsewhere
[4.4,1/2] binder: use euid from cred instead of using task [4.4,1/2] binder: use euid from cred instead of using task 1 - - --- 2021-11-10 Todd Kjos pcmoore Handled Elsewhere
[4.4,2/2] binder: use cred instead of task for selinux checks [4.4,1/2] binder: use euid from cred instead of using task 1 - - --- 2021-11-10 Todd Kjos pcmoore Handled Elsewhere
[4.9,1/2] binder: use euid from cred instead of using task [4.9,1/2] binder: use euid from cred instead of using task 1 - - --- 2021-11-10 Todd Kjos pcmoore Handled Elsewhere
[4.9,2/2] binder: use cred instead of task for selinux checks [4.9,1/2] binder: use euid from cred instead of using task 1 - - --- 2021-11-10 Todd Kjos pcmoore Handled Elsewhere
[4.14,1/2] binder: use euid from cred instead of using task [4.14,1/2] binder: use euid from cred instead of using task 1 - - --- 2021-11-10 Todd Kjos pcmoore Handled Elsewhere
[4.14,2/2] binder: use cred instead of task for selinux checks [4.14,1/2] binder: use euid from cred instead of using task 1 - - --- 2021-11-10 Todd Kjos pcmoore Handled Elsewhere
[4.19,1/2] binder: use euid from cred instead of using task [4.19,1/2] binder: use euid from cred instead of using task 1 - - --- 2021-11-10 Todd Kjos pcmoore Handled Elsewhere
[4.19,2/2] binder: use cred instead of task for selinux checks [4.19,1/2] binder: use euid from cred instead of using task 1 - - --- 2021-11-10 Todd Kjos pcmoore Handled Elsewhere
[5.4,1/3] binder: use euid from cred instead of using task [5.4,1/3] binder: use euid from cred instead of using task 1 - - --- 2021-11-10 Todd Kjos pcmoore Handled Elsewhere
[5.4,2/3] binder: use cred instead of task for selinux checks [5.4,1/3] binder: use euid from cred instead of using task 1 - - --- 2021-11-10 Todd Kjos pcmoore Handled Elsewhere
[5.4,3/3] binder: use cred instead of task for getsecid [5.4,1/3] binder: use euid from cred instead of using task 1 - - --- 2021-11-10 Todd Kjos pcmoore Handled Elsewhere
[5.10,1/3] binder: use euid from cred instead of using task [5.10,1/3] binder: use euid from cred instead of using task 1 - - --- 2021-11-10 Todd Kjos pcmoore Handled Elsewhere
[5.10,2/3] binder: use cred instead of task for selinux checks [5.10,1/3] binder: use euid from cred instead of using task 1 - - --- 2021-11-10 Todd Kjos pcmoore Handled Elsewhere
[5.10,3/3] binder: use cred instead of task for getsecid [5.10,1/3] binder: use euid from cred instead of using task 1 - - --- 2021-11-10 Todd Kjos pcmoore Handled Elsewhere
[V2,1/1] selinux-testsuite: Add btrfs support for filesystem tests selinux-testsuite: Add btrfs support for filesystem tests - - - --- 2020-11-03 Richard Haines omos Queued
[04/21] fs: Replace CURRENT_TIME with current_fs_time() for inode timestamps 1 - - --- 2016-06-09 Deepa Dinamani Deferred
libselinux/getconlist: add verbose switch to print more information libselinux/getconlist: add verbose switch to print more information - - - --- 2020-02-19 Christian Göttsche Deferred
[RFC] selinux: runtime disable is deprecated, add some ssleep() discomfort [RFC] selinux: runtime disable is deprecated, add some ssleep() discomfort - - - --- 2020-06-02 Paul Moore Deferred
[RFC,1/1] selinux-testsuite: Add GTP tests selinux-testsuite: Add GTP tests - - - --- 2020-09-24 Richard Haines omos Deferred
[01/19] block_dev: Support checking inode permissions in lookup_bdev() - - - --- 2015-12-02 Seth Forshee Superseded
[02/19] block_dev: Check permissions towards block device inode when mounting - - - --- 2015-12-02 Seth Forshee Superseded
[03/19] fs: Treat foreign mounts as nosuid - - - --- 2015-12-02 Seth Forshee Superseded
[04/19] selinux: Add support for unprivileged mounts from user namespaces - - - --- 2015-12-02 Seth Forshee Superseded
[05/19] userns: Replace in_userns with current_in_userns - - - --- 2015-12-02 Seth Forshee Superseded
[06/19] Smack: Handle labels consistently in untrusted mounts - - - --- 2015-12-02 Seth Forshee Superseded
[07/19] fs: Check for invalid i_uid in may_follow_link() - - - --- 2015-12-02 Seth Forshee Superseded
[08/19] cred: Reject inodes with invalid ids in set_create_file_as() - - - --- 2015-12-02 Seth Forshee Superseded
[09/19] fs: Refuse uid/gid changes which don't map into s_user_ns - - - --- 2015-12-02 Seth Forshee Superseded
[10/19] fs: Update posix_acl support to handle user namespace mounts - - - --- 2015-12-02 Seth Forshee Superseded
[11/19] fs: Ensure the mounter of a filesystem is privileged towards its inodes - - - --- 2015-12-02 Seth Forshee Superseded
[12/19] fs: Don't remove suid for CAP_FSETID in s_user_ns - - - --- 2015-12-02 Seth Forshee Superseded
[13/19] fs: Allow superblock owner to access do_remount_sb() - - - --- 2015-12-02 Seth Forshee Superseded
[14/19] fs: Permit FIBMAP for users with CAP_SYS_RAWIO in s_user_ns - - - --- 2015-12-02 Seth Forshee Superseded
[15/19] capabilities: Allow privileged user in s_user_ns to set file caps - - - --- 2015-12-02 Seth Forshee Superseded
[16/19] fuse: Add support for pid namespaces - - - --- 2015-12-02 Seth Forshee Superseded
[17/19] fuse: Support fuse filesystems outside of init_user_ns - - - --- 2015-12-02 Seth Forshee Superseded
[18/19] fuse: Restrict allow_other to the superblock's namespace or a descendant - - - --- 2015-12-02 Seth Forshee Superseded
[19/19] fuse: Allow user namespace mounts - - - --- 2015-12-02 Seth Forshee Superseded
[v2,01/18] block_dev: Support checking inode permissions in lookup_bdev() - - - --- 2015-12-07 Seth Forshee Superseded
[v2,02/18] block_dev: Check permissions towards block device inode when mounting - - - --- 2015-12-07 Seth Forshee Superseded
[v2,03/18] fs: Treat foreign mounts as nosuid - - - --- 2015-12-07 Seth Forshee Superseded
[v2,04/18] selinux: Add support for unprivileged mounts from user namespaces - - - --- 2015-12-07 Seth Forshee Superseded
[v2,05/18] userns: Replace in_userns with current_in_userns - - - --- 2015-12-07 Seth Forshee Superseded
[v2,06/18] Smack: Handle labels consistently in untrusted mounts - - - --- 2015-12-07 Seth Forshee Superseded
[v2,07/18] fs: Check for invalid i_uid in may_follow_link() - - - --- 2015-12-07 Seth Forshee Superseded
[v2,08/18] cred: Reject inodes with invalid ids in set_create_file_as() - - - --- 2015-12-07 Seth Forshee Superseded
[v2,09/18] fs: Refuse uid/gid changes which don't map into s_user_ns - - - --- 2015-12-07 Seth Forshee Superseded
[v2,10/18] fs: Update posix_acl support to handle user namespace mounts - - - --- 2015-12-07 Seth Forshee Superseded
[v2,11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes - - - --- 2015-12-07 Seth Forshee Superseded
[v2,12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns - - - --- 2015-12-07 Seth Forshee Superseded
[v2,13/18] fs: Allow superblock owner to access do_remount_sb() - - - --- 2015-12-07 Seth Forshee Superseded
[v2,14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs - - - --- 2015-12-07 Seth Forshee Superseded
[v2,15/18] fuse: Add support for pid namespaces - - - --- 2015-12-07 Seth Forshee Superseded
[v2,16/18] fuse: Support fuse filesystems outside of init_user_ns - - - --- 2015-12-07 Seth Forshee Superseded
[v2,17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant - - - --- 2015-12-07 Seth Forshee Superseded
[v2,18/18] fuse: Allow user namespace mounts - - - --- 2015-12-07 Seth Forshee Superseded
[RFC,01/17] netlabel: Mark rcu pointers with __rcu. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,02/17] netlabel: Add an address family to domain hash entries. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,03/17] netlabel: Initial support for the CALIPSO netlink protocol. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,04/17] netlabel: Add support for querying a CALIPSO DOI. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,05/17] netlabel: Add support for enumerating the CALIPSO DOI list. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,06/17] netlabel: Add support for creating a CALIPSO protocol domain mapping. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,07/17] netlabel: Add support for removing a CALIPSO DOI. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,08/17] ipv6: Add ipv6_renew_options_kern() that accepts a kernel mem pointer. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,09/17] netlabel: Move bitmap manipulation functions to the NetLabel core. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,10/17] calipso: Set the calipso socket label to match the secattr. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,11/17] netlabel: Prevent setsockopt() from changing the hop-by-hop option. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,12/17] ipv6: Allow request socks to contain IPv6 options. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,13/17] calipso: Allow request sockets to be relabelled by the lsm. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,14/17] calipso: Allow the lsm to label the skbuff directly. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,15/17] netlabel: Pass a family parameter to netlbl_skbuff_err(). - - - --- 2015-12-22 Huw Davies Superseded
[RFC,16/17] calipso: Add validation of CALIPSO option. - - - --- 2015-12-22 Huw Davies Superseded
[RFC,17/17] calipso: Add a label cache. - - - --- 2015-12-22 Huw Davies Superseded
[RESEND,v2,01/18] block_dev: Support checking inode permissions in lookup_bdev() - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,02/18] block_dev: Check permissions towards block device inode when mounting - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,03/18] fs: Treat foreign mounts as nosuid - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,04/18] selinux: Add support for unprivileged mounts from user namespaces - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,05/18] userns: Replace in_userns with current_in_userns - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,06/18] Smack: Handle labels consistently in untrusted mounts - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,07/18] fs: Check for invalid i_uid in may_follow_link() - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,08/18] cred: Reject inodes with invalid ids in set_create_file_as() - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,09/18] fs: Refuse uid/gid changes which don't map into s_user_ns - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,10/18] fs: Update posix_acl support to handle user namespace mounts - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,13/18] fs: Allow superblock owner to access do_remount_sb() - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,15/18] fuse: Add support for pid namespaces - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,16/18] fuse: Support fuse filesystems outside of init_user_ns - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant - - - --- 2016-01-04 Seth Forshee Superseded
[RESEND,v2,18/18] fuse: Allow user namespace mounts - - - --- 2016-01-04 Seth Forshee Superseded
[1/3] libsepol: Add function to check if module name matches filename - - - --- 2016-03-25 James Carter Superseded
[2/3] policycoreutils/hll/pp: Warn if module name different from filenames - - - --- 2016-03-25 James Carter Superseded
« 1 2 3 465 66 »