Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 26 Mar 2015 13:43:06 +0530
From: Huzaifa Sidhpurwala <huzaifas@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: Fwd: setroubleshoot root exploit (CVE-Request)

On 03/26/2015 12:31 PM, Sebastian Krahmer wrote:
> 
> As per list policy, here is the forward of the distros post. CRD was shifted
> to today.
> 
> 
> ----- Forwarded message from Sebastian Krahmer <krahmer@...e.de> -----
> 
> Date: Wed, 18 Mar 2015 09:46:10 +0100
> From: Sebastian Krahmer <krahmer@...e.de>
> To: distros@...openwall.org
> subject: ***UNCHECKED*** [vs] setroubleshoot root exploit (CVE-Request)
> X-Mailer: MIME-tools 5.501 (Entity 5.501)
> 
> Hi
> 
> I already sent this to upstream. Initially I thought this only
> affects redhat, but it seems that ubuntu is also using setroubleshoot.
> CRD is 24.3.
> 
> setroubleshoot tries to find out which rpm a particular
> file belongs to when it finds SELinux access violation reports.
> The idea is probably to have convenient reports for the admin
> which type enforcement rules have to be relaxed. setroubleshoot
> runs as root (although in its own domain). In util.py
> we have:
> 
> 
Previously CVE-2015-1815 as assigned on distros.




-- 
Huzaifa Sidhpurwala / Red Hat Product Security Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ