sesearch -A -s ircd_t -c file -p execute
If you run the above command on an SE Linux system with the ircd module loaded into the policy it will show the file types that can be executed. That means shared objects in the current policy.
Note that there have been many releases of the policy over the last 10 years and many per-distribution customisations. So I can't claim that every SE Linux policy that was included in every distribution did the right thing in this regard. But the sesearch command allows any SE Linux sysadmin to determine if their system does what they desire.
But it does seem that someone who ran UnrealIRCd on a SE Linux system and who used the correct context for the executable would not be vulnerable to a problem that merely used the system() call.
Of course there are lots of other things that an attacker could potentially do.
Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds