oss-sec mailing list archives
Re: CVE-2016-7545 -- SELinux sandbox escape
From: christos () zoulas com (Christos Zoulas)
Date: Mon, 26 Sep 2016 13:53:02 -0400
On Sep 26, 6:54pm, jwilk () jwilk net (Jakub Wilk) wrote: -- Subject: Re: [oss-security] CVE-2016-7545 -- SELinux sandbox escape | Are there any use cases for TIOCSTI other than producing exploits? On the BSDs TIOCSTI has been limited to the superuser since the 4.4BSD Lite 2 release in 1995 (IIRC). I think that linux should follow suit if it has not (yet). For those who are interested in the history of this, I believe that first we checked only the userid (4.2BSD), then we checked the userid and that the process was a session leader (4.3BSD), and finally we decided that this was too big of a hole and limited it to the superuser. christos
Current thread:
- CVE-2016-7545 -- SELinux sandbox escape up201407890 (Sep 25)
- Re: CVE-2016-7545 -- SELinux sandbox escape Jakub Wilk (Sep 26)
- Re: CVE-2016-7545 -- SELinux sandbox escape John Haxby (Sep 26)
- Re: CVE-2016-7545 -- SELinux sandbox escape up201407890 (Sep 26)
- Re: CVE-2016-7545 -- SELinux sandbox escape Christos Zoulas (Sep 26)
- Re: CVE-2016-7545 -- SELinux sandbox escape Jakub Wilk (Sep 29)
- Re: CVE-2016-7545 -- SELinux sandbox escape Christos Zoulas (Sep 29)
- Re: CVE-2016-7545 -- SELinux sandbox escape Jakub Wilk (Sep 26)