oss-sec mailing list archives
Re: CVE Request: Linux kernel: SELinux local DoS
From: Florian Weimer <fweimer () redhat com>
Date: Thu, 06 Feb 2014 19:33:21 +0100
On 02/06/2014 06:44 PM, P J P wrote:
Linux kernel built with the NSA SELinux Support(CONFIG_SECURITY_SELINUX) is vulnerable to a crash caused by an empty SELinux security context. When a file has an empty security context, listing it via 'ls(1)' could trigger this crash. Only user/processes with CAP_MAC_ADMIN privileges are allowed to set the SELinux security context of a file.
Note that this also affects systems providing facilities which allow unprivileged users to mount crafted file systems. Some of these services do not require physical access to the machine to trigger file system mounting.
-- Florian Weimer / Red Hat Product Security Team
Current thread:
- CVE Request: Linux kernel: SELinux local DoS P J P (Feb 06)
- Re: CVE Request: Linux kernel: SELinux local DoS Florian Weimer (Feb 06)
- Re: CVE Request: Linux kernel: SELinux local DoS cve-assign (Feb 06)