Re: Push mmap_min_addr changes to Linus

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 14 Aug 2009, Eric Paris wrote:

> I'm tired of these recent exploits and SELinux being weaker against
> local user priv escalation bugs using NULL pointers.  Can we push 
> 
> 7c73875e7dda627040b12c19b01db634fa7f0fd1
> 84336d1a77ccd2c06a730ddd38e695c2324a7386
> a2551df7ec568d87793d2eea4ca744e86318f205
> 47d439e9fb8a81a90022cfa785bf1c36c4e2aff6
> 
> To linus?  It's fixing a clear security bug in that we are not checking
> DAC before granting mmap_min_addr.  If need be I'll write another
> smaller patch which just does the DAC check in the SELinux security
> hook, but I'd rather see the true separation.

Probably best to make the smallest possible change now, so I suggest the 
latter (which might be useful for distro backporting).


-- 
James Morris
<jmorris@xxxxxxxxx>

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux