Re: Proof is in the pudding

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 17/05/13 01:03, Douglas Brown wrote:
> Hi all,
> 
> You may have seen this vulnerability talked about
> recently: http://arstechnica.com/security/2013/05/critical-linux-vulnerability-imperils-users-even-after-silent-fix/
> 
> After a long time of evangelising about SELinux to my sceptical
> colleagues, this seemed like the perfect opportunity to test it.
> 
> We tried the exploit with SELinux in permissive mode and it worked then
> in enforcing and SELinux prevented it! Not that I'm surprised, but it's
> nice to have a real-world exploit to demonstrate.

Unfortunately, whatever you tested was not this.

$ ls -la sem*
-rwxrwxr-x. 1 trevor trevor 10007 May 14 13:39 semtex
-rw-rw-r--. 1 trevor trevor  2488 May 14 13:39 semtex.c
$ getenforce
Enforcing
$ uname -a
Linux hostname 2.6.32-358.6.1.el6.x86_64 #1 SMP Tue Apr 23 19:29:00 UTC
2013 x86_64 x86_64 x86_64 GNU/Linux
$ ./semtex
2.6.37-3.x x86_64
sd@xxxxxxxxxxxxx 2010
-sh-4.1#

Sorry.

Trevor
--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux





[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux