Vigil@nce - Linux kernel: denial of service via selinux_nlmsg_perm
November 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker can use malicious Netlink messages on the Linux kernel, in order to trigger a denial of service.
Impacted products: Linux.
Creation date: 05/11/2015.
DESCRIPTION OF THE VULNERABILITY
The Linux kernel uses Netlink sockets to exchange information about the network.
The selinux_nlmsg_perm() function of the security/selinux/hooks.c file displays an error message if the Netlink message is unknown. However, there is no rate limitation on the number of messages which can be displayed.
A local attacker can therefore use malicious Netlink messages on the Linux kernel, in order to trigger a denial of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN