CVE-2015-5602 and SELinux

Lakshmipathi.G lakshmipathi.g at gmail.com
Wed Nov 4 11:42:17 UTC 2015


Thanks for the blog post. Quick question, this affects only when root gives
permission to 'usr' to edit
files owned by him?

We rely heavily on SELinux to confine users (guest_u)  on our project (
www.webminal.org)

----
Cheers,
Lakshmipathi.G
FOSS Programmer.
www.giis.co.in

On Wed, Nov 4, 2015 at 4:44 PM, Miroslav Grepl <mgrepl at redhat.com> wrote:

> We wrote a blog post explaining how SELinux helps you with this sudo CVE.
>
> https://mgrepl.wordpress.com/2015/11/04/cve-2015-5602-and-selinux/
>
> --
> Miroslav Grepl
> Senior Software Engineer, SELinux Solutions
> Red Hat, Inc.
> --
> selinux mailing list
> selinux at lists.fedoraproject.org
> https://admin.fedoraproject.org/mailman/listinfo/selinux
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.fedoraproject.org/pipermail/selinux/attachments/20151104/4426178e/attachment.html>


More information about the selinux mailing list