CVE-2015-5602 and SELinux
Lakshmipathi.G
lakshmipathi.g at gmail.com
Wed Nov 4 11:42:17 UTC 2015
Thanks for the blog post. Quick question, this affects only when root gives
permission to 'usr' to edit
files owned by him?
We rely heavily on SELinux to confine users (guest_u) on our project (
www.webminal.org)
----
Cheers,
Lakshmipathi.G
FOSS Programmer.
www.giis.co.in
On Wed, Nov 4, 2015 at 4:44 PM, Miroslav Grepl <mgrepl at redhat.com> wrote:
> We wrote a blog post explaining how SELinux helps you with this sudo CVE.
>
> https://mgrepl.wordpress.com/2015/11/04/cve-2015-5602-and-selinux/
>
> --
> Miroslav Grepl
> Senior Software Engineer, SELinux Solutions
> Red Hat, Inc.
> --
> selinux mailing list
> selinux at lists.fedoraproject.org
> https://admin.fedoraproject.org/mailman/listinfo/selinux
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.fedoraproject.org/pipermail/selinux/attachments/20151104/4426178e/attachment.html>
More information about the selinux
mailing list