Re: Question for the experts -- DIRTY COW and SELinux

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Oct 24, 2016 at 9:35 AM, Stephen Smalley <sds@xxxxxxxxxxxxx> wrote:
>
> On 10/21/2016 06:20 PM, Robert Lee wrote:
> > Given the unpleasant nature of CVE-2016-5195, would an SELinux confined
> > application that exploited the Dirty COW vulnerability be capable also
> > of escaping domain enforcement?
> >
> > Hopefully my question is not ambiguous.
> >
> > Thanks in advance.
>
> Sorry, SELinux can't help with CVE-2016-5195.
>
> _______________________________________________
> Selinux mailing list
> Selinux@xxxxxxxxxxxxx
> To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
> To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.

Couldn't SELinux help reduce the attack surface.  From the small
amount of testing I have conducted, it looks like the attacker is
required to be able to read the file or object they are trying to
manipulate.  If MAC denies read, the attack doesn't work right?

Please let me know if I'm mistaken.


-- 
Judd Meinders
Sr. Software Security Engineer
e. judd.meinders@xxxxxxxxxxxxxxxxxxx
p. 319-263-1875
_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.



[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux