Vigil@nce - Linux kernel: denial of service via selinux_nlmsg_perm
November 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker can use malicious Netlink messages on the Linux
kernel, in order to trigger a denial of service.
Impacted products: Linux.
Severity: 1/4.
Creation date: 05/11/2015.
DESCRIPTION OF THE VULNERABILITY
The Linux kernel uses Netlink sockets to exchange information
about the network.
The selinux_nlmsg_perm() function of the security/selinux/hooks.c
file displays an error message if the Netlink message is unknown.
However, there is no rate limitation on the number of messages
which can be displayed.
A local attacker can therefore use malicious Netlink messages on
the Linux kernel, in order to trigger a denial of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Linux-kernel-denial-of-service-via-selinux-nlmsg-perm-18252