Research
Skip Research Menus
Research MenuSecurity Enhanced Linux What's New Frequently Asked Questions Background Documents License Download Participating Mail List Archives Remaining Work Contributors Related Work Press Releases Information Assurance Research NIARL In-house Research Areas Mathematical Sciences Program Sabbaticals Computer & Information Sciences Research Technology Transfer Advanced Computing Advanced Mathematics Communications & Networking Information Processing Microelectronics Other Technologies Technology Fact Sheets Publications Related Links |
SELinux Mailing ListRe: 'chcon': possible weakness
From: Russell Coker <russell_at_coker.com.au>
Date: Mon, 2 Oct 2006 10:20:12 +1000
Sure they can execute chcon, but they can only change context in accordance with policy. Having chcon with type bin_t is no more a security issue than having chmod with mode 0755 in the Unix permissions system. You can run the program without limits, but what operations that program will be capable of are very limited. Do an experiment by running a shell as httpd_t and try execing chcon and see what you can do. Or use "apol" to analyse the policy and see what relabelto and relabelfrom operations are permitted. -- russell@coker.com.au http://etbe.blogspot.com/ My Blog http://www.coker.com.au/sponsorship.html Sponsoring Free Software development -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message.Received on Sun 1 Oct 2006 - 20:20:10 EDT |
|
Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009 |