SELinux to protect you

Kommentieren Mar 27 2015 .txt, .json, .md

Fwd: setroubleshoot root exploit (CVE-Request)

So. Yes, thats correct: The SELinux system that is only there to protect you, passes attacker controlled data to sh -c (https://docs.python.org/2/library/commands.html) inside a daemon running as root. Sacken lassen…

Ups….