Show patches with: Archived = No       |   9264 patches
« 1 2 ... 90 91 92 93 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
libselinux/man: Add information about thread specific on setfscreatecon - - - --- 2015-12-09 Petr Lautrbach Accepted
libselinux: Verify context input to funtions to make sure the context field is not null. - - - --- 2015-12-09 Petr Lautrbach Rejected
[v2,18/18] fuse: Allow user namespace mounts - - - --- 2015-12-07 Seth Forshee Superseded
[v2,17/18] fuse: Restrict allow_other to the superblock's namespace or a descendant - - - --- 2015-12-07 Seth Forshee Superseded
[v2,16/18] fuse: Support fuse filesystems outside of init_user_ns - - - --- 2015-12-07 Seth Forshee Superseded
[v2,15/18] fuse: Add support for pid namespaces - - - --- 2015-12-07 Seth Forshee Superseded
[v2,14/18] capabilities: Allow privileged user in s_user_ns to set security.* xattrs - - - --- 2015-12-07 Seth Forshee Superseded
[v2,13/18] fs: Allow superblock owner to access do_remount_sb() - - - --- 2015-12-07 Seth Forshee Superseded
[v2,12/18] fs: Don't remove suid for CAP_FSETID in s_user_ns - - - --- 2015-12-07 Seth Forshee Superseded
[v2,11/18] fs: Ensure the mounter of a filesystem is privileged towards its inodes - - - --- 2015-12-07 Seth Forshee Superseded
[v2,10/18] fs: Update posix_acl support to handle user namespace mounts - - - --- 2015-12-07 Seth Forshee Superseded
[v2,09/18] fs: Refuse uid/gid changes which don't map into s_user_ns - - - --- 2015-12-07 Seth Forshee Superseded
[v2,08/18] cred: Reject inodes with invalid ids in set_create_file_as() - - - --- 2015-12-07 Seth Forshee Superseded
[v2,07/18] fs: Check for invalid i_uid in may_follow_link() - - - --- 2015-12-07 Seth Forshee Superseded
[v2,06/18] Smack: Handle labels consistently in untrusted mounts - - - --- 2015-12-07 Seth Forshee Superseded
[v2,05/18] userns: Replace in_userns with current_in_userns - - - --- 2015-12-07 Seth Forshee Superseded
[v2,04/18] selinux: Add support for unprivileged mounts from user namespaces - - - --- 2015-12-07 Seth Forshee Superseded
[v2,03/18] fs: Treat foreign mounts as nosuid - - - --- 2015-12-07 Seth Forshee Superseded
[v2,02/18] block_dev: Check permissions towards block device inode when mounting - - - --- 2015-12-07 Seth Forshee Superseded
[v2,01/18] block_dev: Support checking inode permissions in lookup_bdev() - - - --- 2015-12-07 Seth Forshee Superseded
libsepol/cil: Validate extended avrules and permissionxs - - - --- 2015-12-07 Steve Lawrence Accepted
[19/19] fuse: Allow user namespace mounts - - - --- 2015-12-02 Seth Forshee Superseded
[18/19] fuse: Restrict allow_other to the superblock's namespace or a descendant - - - --- 2015-12-02 Seth Forshee Superseded
[17/19] fuse: Support fuse filesystems outside of init_user_ns - - - --- 2015-12-02 Seth Forshee Superseded
[16/19] fuse: Add support for pid namespaces - - - --- 2015-12-02 Seth Forshee Superseded
[15/19] capabilities: Allow privileged user in s_user_ns to set file caps - - - --- 2015-12-02 Seth Forshee Superseded
[14/19] fs: Permit FIBMAP for users with CAP_SYS_RAWIO in s_user_ns - - - --- 2015-12-02 Seth Forshee Superseded
[13/19] fs: Allow superblock owner to access do_remount_sb() - - - --- 2015-12-02 Seth Forshee Superseded
[12/19] fs: Don't remove suid for CAP_FSETID in s_user_ns - - - --- 2015-12-02 Seth Forshee Superseded
[11/19] fs: Ensure the mounter of a filesystem is privileged towards its inodes - - - --- 2015-12-02 Seth Forshee Superseded
[10/19] fs: Update posix_acl support to handle user namespace mounts - - - --- 2015-12-02 Seth Forshee Superseded
[09/19] fs: Refuse uid/gid changes which don't map into s_user_ns - - - --- 2015-12-02 Seth Forshee Superseded
[08/19] cred: Reject inodes with invalid ids in set_create_file_as() - - - --- 2015-12-02 Seth Forshee Superseded
[07/19] fs: Check for invalid i_uid in may_follow_link() - - - --- 2015-12-02 Seth Forshee Superseded
[06/19] Smack: Handle labels consistently in untrusted mounts - - - --- 2015-12-02 Seth Forshee Superseded
[05/19] userns: Replace in_userns with current_in_userns - - - --- 2015-12-02 Seth Forshee Superseded
[04/19] selinux: Add support for unprivileged mounts from user namespaces - - - --- 2015-12-02 Seth Forshee Superseded
[03/19] fs: Treat foreign mounts as nosuid - - - --- 2015-12-02 Seth Forshee Superseded
[02/19] block_dev: Check permissions towards block device inode when mounting - - - --- 2015-12-02 Seth Forshee Superseded
[01/19] block_dev: Support checking inode permissions in lookup_bdev() - - - --- 2015-12-02 Seth Forshee Superseded
libsepol/cil: Remove duplicated 'if' condition in cil_tree - - - --- 2015-12-01 Steve Lawrence Accepted
[2/2] secilc/docs: Add documentation for neverallowx rules - - - --- 2015-12-01 Steve Lawrence Accepted
[1/2] libsepol/cil: Add support for neverallowx - - - --- 2015-12-01 Steve Lawrence Accepted
[selinux-testsuite] net_socket: replace md5 with sha1 in ipsec-load - - - --- 2015-12-01 Jan Stancek Accepted
policycoreutils: fix 'semanage permissive -l' subcommand - - - --- 2015-11-30 Petr Lautrbach Accepted
policycoreutils: replace string.join() with str.join() - - - --- 2015-11-25 Petr Lautrbach Accepted
selinux: fix bug in conditional rules handling - - - --- 2015-11-23 Stephen Smalley Accepted
(Userspace) AVC denial generated even if allowed by the policy? - - - --- 2015-11-23 Laurent Bigonville Not Applicable
(Userspace) AVC denial generated even if allowed by the policy? - - - --- 2015-11-23 Laurent Bigonville Rejected
libselinux: Correct line count for property and service contexts files - - - --- 2015-11-23 Richard Haines Accepted
libsepol: Fully expand neverallowxperm rules - - - --- 2015-11-21 Richard Haines Accepted
[v3,7/7] Smack: Handle labels consistently in untrusted mounts - - - --- 2015-11-17 Seth Forshee Not Applicable
[v3,6/7] userns: Replace in_userns with current_in_userns - - - --- 2015-11-17 Seth Forshee Not Applicable
[v3,5/7] selinux: Add support for unprivileged mounts from user namespaces - - - --- 2015-11-17 Seth Forshee Not Applicable
[v3,4/7] fs: Treat foreign mounts as nosuid - - - --- 2015-11-17 Seth Forshee Not Applicable
[v3,3/7] mtd: Check permissions towards mtd block device inode when mounting - - - --- 2015-11-17 Seth Forshee Not Applicable
[v3,2/7] block_dev: Check permissions towards block device inode when mounting - - - --- 2015-11-17 Seth Forshee Not Applicable
[v3,1/7] block_dev: Support checking inode permissions in lookup_bdev() - - - --- 2015-11-17 Seth Forshee Not Applicable
policycoreutils: Require at least one argument for 'semanage permissive -d' - - - --- 2015-11-17 Petr Lautrbach Accepted
policycoreutils: improve sepolicy command line interface - - - --- 2015-11-16 Petr Lautrbach Accepted
[selinux-testsuite,v2,3/4] mmap/mprotect_heap: make sure memory is allocated from heap - - - --- 2015-11-16 Jan Stancek pcmoore Accepted
policycoreutils/sandbox: Fix sandbox to propagate specified MCS/MLS Security Level. - - - --- 2015-11-14 Miroslav Grepl Accepted
[v3] selinux: rate-limit unrecognized netlink message warnings in selinux_nlmsg_perm() - - - --- 2015-11-13 Vladis Dronov pcmoore Accepted
sepolgen: Use key function in sort() - - - --- 2015-11-13 Petr Lautrbach Accepted
« 1 2 ... 90 91 92 93 »