Research
.
Skip Search Box

SELinux Mailing List

Re: [PATCH] SELinux protection for exploiting null dereference using mmap

From: Stephen Smalley <sds_at_tycho.nsa.gov>
Date: Thu, 31 May 2007 11:07:04 -0400


On Thu, 2007-05-31 at 07:55 -0700, Ulrich Drepper wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Stephen Smalley wrote:
> > Or it could be a sysctl value if you wanted it to generalize beyond
> > selinux.
>
> That's likely the right answer. But then you need to protect changing
> the value. How does SELinux deal with that?

The policy can label sysctls based on their name (since there we can generate a reliable stable name from kernel data that isn't subject to userspace manipulation or aliasing, unlike typical pathnames), and then control access based on the TE type.

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
Received on Thu 31 May 2007 - 11:07:56 EDT
 

Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009

 
bottom

National Security Agency / Central Security Service