Re: CVE-2015-5602 and SELinux

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 11/04/2015 12:42 PM, Lakshmipathi.G wrote:
> Thanks for the blog post. Quick question, this affects only when root
> gives permission to 'usr' to edit
> files owned by him? 

That's correct. You can read more details in
https://www.exploit-db.com/exploits/37710/.

> 
> We rely heavily on SELinux to confine users (guest_u)  on our project
> (www.webminal.org <http://www.webminal.org>) 
> 
> ----
> Cheers,
> Lakshmipathi.G
> FOSS Programmer.
> www.giis.co.in <http://www.giis.co.in>
> 
> On Wed, Nov 4, 2015 at 4:44 PM, Miroslav Grepl <mgrepl@xxxxxxxxxx
> <mailto:mgrepl@xxxxxxxxxx>> wrote:
> 
>     We wrote a blog post explaining how SELinux helps you with this sudo
>     CVE.
> 
>     https://mgrepl.wordpress.com/2015/11/04/cve-2015-5602-and-selinux/
> 
>     --
>     Miroslav Grepl
>     Senior Software Engineer, SELinux Solutions
>     Red Hat, Inc.
>     --
>     selinux mailing list
>     selinux@xxxxxxxxxxxxxxxxxxxxxxx <mailto:selinux@xxxxxxxxxxxxxxxxxxxxxxx>
>     https://admin.fedoraproject.org/mailman/listinfo/selinux
> 
> 


-- 
Miroslav Grepl
Senior Software Engineer, SELinux Solutions
Red Hat, Inc.
--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux




[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux