Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <52F3D571.6080806@redhat.com>
Date: Thu, 06 Feb 2014 19:33:21 +0100
From: Florian Weimer <fweimer@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request: Linux kernel: SELinux local DoS

On 02/06/2014 06:44 PM, P J P wrote:

> Linux kernel built with the NSA SELinux Support(CONFIG_SECURITY_SELINUX)
> is vulnerable to a crash caused by an empty SELinux security context.
> When a file has an empty security context, listing it via 'ls(1)' could
> trigger this crash. Only user/processes with CAP_MAC_ADMIN privileges
> are allowed to set the SELinux security context of a file.

Note that this also affects systems providing facilities which allow 
unprivileged users to mount crafted file systems.  Some of these 
services do not require physical access to the machine to trigger file 
system mounting.

-- 
Florian Weimer / Red Hat Product Security Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.