Linux kernel built with the NSA SELinux Support(CONFIG_SECURITY_SELINUX) is vulnerable to a crash caused by an empty SELinux security context value. If a file has an empty security context, listing it via 'ls(1)' could trigger this crash. Only user/processes with CAP_MAC_ADMIN privileges are allowed to set the SELinux security context of a file. A user/process with CAP_MAC_ADMIN privileges could use this flaw to crash the kernel, resulting in a DoS. Upstream fix: ------------- -> http://marc.info/?l=selinux&m=139110025203759&w=2
Statement: This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5.
This issue was assigned CVE-2014-1874: http://seclists.org/oss-sec/2014/q1/273
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1062507]
commit 2172fa709ab32ca60e86179dc67d0857be8e2c98 upstream
kernel-3.13.3-201.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2014:0439 https://rhn.redhat.com/errata/RHSA-2014-0439.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2014:0771 https://rhn.redhat.com/errata/RHSA-2014-0771.html