|
|
Log in / Subscribe / Register

SELinux policy issue

SELinux policy issue

Posted Jul 17, 2009 22:41 UTC (Fri) by jamesmrh (guest, #31622)
In reply to: Linux 2.6.30 exploit posted by kjp
Parent article: Linux 2.6.30 exploit posted

Yes, there was a mistake in the SELinux policy, which allowed the unconfined user to bypass the mmap_min_addr check, which otherwise would have been enforced if the check was enabled (many disable it to get wine etc. working, btw, google "disable mmap_min_addr"). This is being fixed in the policy.

The lesson learned here is that more careful review of policy changes needs to happen, and to ask the question as to whether the policy is capable of weakening default security.

The LSM interface is theoretically designed to only allow further restriction of access, but this is a special case, where we are applying policy to a kernel compilation option which can also have its value set via a sysctl. It's not a typical "access this resource or not?" decision.


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds