[CVE-2014-1874] SELinux local DoS

Andy Whitcroft apw at canonical.com
Mon Feb 10 14:31:42 UTC 2014


CVE-2014-1874:
    Setting an empty security context (length=0) on a file will lead to
    incorrectly dereferencing the type and other fields of the security
    context structure, yielding a kernel BUG.  As a zero-length security
    context is never valid, just reject all such security contexts whether
    coming from userspace via setxattr or coming from the filesystem upon
    a getxattr request by SELinux.

Following this email is a patch for lucid, precise,
precise/lts-backport-raring, quantal, and saucy. Proposing for SRU to
those releases.

-apw




More information about the kernel-team mailing list