Candidate: Description: processes with CAP_SYS_RAWIO could bypass selinux mmapm_min_addr References: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=blobdiff;f=security/min_addr.c;fp=security/min_addr.c;h=fc43c9d37084599056680e55c5e8c38491b117ba;hp=c844eed7915d0d270c058c16d6b3db40ffa576d0;hb=83fdbfbfe6e7e8906e3a3f8f6bc074d887e92109;hpb=d9b2c4d0b03c721808c0d259e43a27f1e80205bc Notes: Bugs: upstream: released (2.6.33) [0e1a6ef2] 2.6.32-upstream-stable: released (2.6.32.11) [c907edc6] linux-2.6: released (2.6.32-11) [bugfix/all/stable/2.6.32.11.patch] 2.6.18-etch-security: N/A "introduced in 2.6.31 commit 788084a" 2.6.24-etch-security: N/A "introduced in 2.6.31 commit 788084a" 2.6.26-lenny-security: N/A "introduced in 2.6.31 commit 788084a" 2.6.32-squeeze-security: released (2.6.32-11) [bugfix/all/stable/2.6.32.11.patch]