<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/security, branch v2.6.15.1</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/security?h=v2.6.15.1</id>
<link rel='self' href='https://git.amat.us/linux/atom/security?h=v2.6.15.1'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2005-12-01T23:48:56Z</updated>
<entry>
<title>[PATCH] Keys: Fix permissions check for update vs add</title>
<updated>2005-12-01T23:48:56Z</updated>
<author>
<name>David Howells</name>
<email>dhowells@redhat.com</email>
</author>
<published>2005-12-01T08:51:18Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=db1d1d57e97700b4131fe80556dc6ef976d534c4'/>
<id>urn:sha1:db1d1d57e97700b4131fe80556dc6ef976d534c4</id>
<content type='text'>
Permit add_key() to once again update a matching key rather than adding a
new one if a matching key already exists in the target keyring.

This bug causes add_key() to always add a new key, displacing the old from
the target keyring.

Signed-off-by: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] selinux: extend selinuxfs context interface</title>
<updated>2005-11-09T15:55:51Z</updated>
<author>
<name>Stephen Smalley</name>
<email>sds@tycho.nsa.gov</email>
</author>
<published>2005-11-09T05:34:33Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=ce9982d048bb498c38ec1fe2ae59a44350882f3f'/>
<id>urn:sha1:ce9982d048bb498c38ec1fe2ae59a44350882f3f</id>
<content type='text'>
This patch extends the selinuxfs context interface to allow return the
canonical form of the context to userspace.

Signed-off-by: Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] selinux: disable setxattr on mountpoint labeled filesystems</title>
<updated>2005-11-09T15:55:51Z</updated>
<author>
<name>Stephen Smalley</name>
<email>sds@tycho.nsa.gov</email>
</author>
<published>2005-11-09T05:34:33Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=25a74f3ba8efb394e9a30d6de37566bf03fd3de8'/>
<id>urn:sha1:25a74f3ba8efb394e9a30d6de37566bf03fd3de8</id>
<content type='text'>
This patch disables the setting of SELinux xattrs on files created in
filesystems labeled via mountpoint labeling (mounted with the context=
option).  selinux_inode_setxattr already prevents explicit setxattr from
userspace on such filesystems, so this provides consistent behavior for
file creation.

Signed-off-by: Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Signed-off-by: James Morris &lt;jmorris@namei.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] selinux: MLS compatibility</title>
<updated>2005-11-09T15:55:51Z</updated>
<author>
<name>Stephen Smalley</name>
<email>sds@tycho.nsa.gov</email>
</author>
<published>2005-11-09T05:34:32Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=e517a0cd859ae0c4d9451107113fc2b076456f8f'/>
<id>urn:sha1:e517a0cd859ae0c4d9451107113fc2b076456f8f</id>
<content type='text'>
This patch enables files created on a MLS-enabled SELinux system to be
accessible on a non-MLS SELinux system, by skipping the MLS component of
the security context in the non-MLS case.

Signed-off-by:  Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Signed-off-by:  James Morris &lt;jmorris@namei.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] kfree cleanup: security</title>
<updated>2005-11-07T15:54:06Z</updated>
<author>
<name>Jesper Juhl</name>
<email>jesper.juhl@gmail.com</email>
</author>
<published>2005-11-07T09:01:35Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=a7f988ba304c5f6e78f937a06d120a0097b4d351'/>
<id>urn:sha1:a7f988ba304c5f6e78f937a06d120a0097b4d351</id>
<content type='text'>
This is the security/ part of the big kfree cleanup patch.

Remove pointless checks for NULL prior to calling kfree() in security/.

Signed-off-by: Jesper Juhl &lt;jesper.juhl@gmail.com&gt;
Acked-by: James Morris &lt;jmorris@namei.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] Keys: Remove incorrect and obsolete '!' operators</title>
<updated>2005-11-07T15:53:37Z</updated>
<author>
<name>David Howells</name>
<email>dhowells@redhat.com</email>
</author>
<published>2005-11-07T08:59:30Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=0f6ed7c2641fe4cea83cd09c21928ca30c0983ec'/>
<id>urn:sha1:0f6ed7c2641fe4cea83cd09c21928ca30c0983ec</id>
<content type='text'>
The attached patch removes a couple of incorrect and obsolete '!' operators
left over from the conversion of the key permission functions from
true/false returns to zero/error returns.

Signed-Off-By: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] cleanup the usage of SEND_SIG_xxx constants</title>
<updated>2005-10-31T01:37:31Z</updated>
<author>
<name>Oleg Nesterov</name>
<email>oleg@tv-sign.ru</email>
</author>
<published>2005-10-30T23:03:45Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=621d31219d9a788bda924a0613048053f3f5f211'/>
<id>urn:sha1:621d31219d9a788bda924a0613048053f3f5f211</id>
<content type='text'>
This patch simplifies some checks for magic siginfo values.  It should not
change the behaviour in any way.

Signed-off-by: Oleg Nesterov &lt;oleg@tv-sign.ru&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] remove hardcoded SEND_SIG_xxx constants</title>
<updated>2005-10-31T01:37:31Z</updated>
<author>
<name>Oleg Nesterov</name>
<email>oleg@tv-sign.ru</email>
</author>
<published>2005-10-30T23:03:44Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=b67a1b9e4bf878aa5d4b6b44cb5a251a2f425f0d'/>
<id>urn:sha1:b67a1b9e4bf878aa5d4b6b44cb5a251a2f425f0d</id>
<content type='text'>
This patch replaces hardcoded SEND_SIG_xxx constants with
their symbolic names.

No changes in affected .o files.

Signed-off-by: Oleg Nesterov &lt;oleg@tv-sign.ru&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] Keys: Add LSM hooks for key management [try #3]</title>
<updated>2005-10-31T01:37:23Z</updated>
<author>
<name>David Howells</name>
<email>dhowells@redhat.com</email>
</author>
<published>2005-10-30T23:02:44Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=29db9190634067c5a328ee5fcc2890251b836b4b'/>
<id>urn:sha1:29db9190634067c5a328ee5fcc2890251b836b4b</id>
<content type='text'>
The attached patch adds LSM hooks for key management facilities. The notable
changes are:

 (1) The key struct now supports a security pointer for the use of security
     modules. This will permit key labelling and restrictions on which
     programs may access a key.

 (2) Security modules get a chance to note (or abort) the allocation of a key.

 (3) The key permission checking can now be enhanced by the security modules;
     the permissions check consults LSM if all other checks bear out.

 (4) The key permissions checking functions now return an error code rather
     than a boolean value.

 (5) An extra permission has been added to govern the modification of
     attributes (UID, GID, permissions).

Note that there isn't an LSM hook specifically for each keyctl() operation,
but rather the permissions hook allows control of individual operations based
on the permission request bits.

Key management access control through LSM is enabled by automatically if both
CONFIG_KEYS and CONFIG_SECURITY are enabled.

This should be applied on top of the patch ensubjected:

	[PATCH] Keys: Possessor permissions should be additive

Signed-Off-By: David Howells &lt;dhowells@redhat.com&gt;
Signed-off-by: Chris Wright &lt;chrisw@osdl.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] Keys: Export user-defined keyring operations</title>
<updated>2005-10-31T01:37:22Z</updated>
<author>
<name>David Howells</name>
<email>dhowells@redhat.com</email>
</author>
<published>2005-10-30T23:02:42Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=2aa349f6e37ce030060c994d3aebbff4ab703565'/>
<id>urn:sha1:2aa349f6e37ce030060c994d3aebbff4ab703565</id>
<content type='text'>
Export user-defined key operations so that those who wish to define their
own key type based on the user-defined key operations may do so (as has
been requested).

The header file created has been placed into include/keys/user-type.h, thus
creating a directory where other key types may also be placed.  Any
objections to doing this?

Signed-Off-By: David Howells &lt;dhowells@redhat.com&gt;
Signed-Off-By: Arjan van de Ven &lt;arjan@infradead.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
</feed>
