On 11/04/2015 12:42 PM, Lakshmipathi.G wrote:
Thanks for the blog post. Quick question, this affects only when
root
gives permission to 'usr' to edit
files owned by him?
That's correct. You can read more details in
https://www.exploit-db.com/exploits/37710/.
We rely heavily on SELinux to confine users (guest_u) on our project
(
www.webminal.org <
http://www.webminal.org>)
----
Cheers,
Lakshmipathi.G
FOSS Programmer.
www.giis.co.in <
http://www.giis.co.in>
On Wed, Nov 4, 2015 at 4:44 PM, Miroslav Grepl <mgrepl(a)redhat.com
<mailto:mgrepl@redhat.com>> wrote:
We wrote a blog post explaining how SELinux helps you with this sudo
CVE.
https://mgrepl.wordpress.com/2015/11/04/cve-2015-5602-and-selinux/
--
Miroslav Grepl
Senior Software Engineer, SELinux Solutions
Red Hat, Inc.
--
selinux mailing list
selinux(a)lists.fedoraproject.org <mailto:selinux@lists.fedoraproject.org>
https://admin.fedoraproject.org/mailman/listinfo/selinux
--
Miroslav Grepl
Senior Software Engineer, SELinux Solutions
Red Hat, Inc.