SELinux to protect you
Fwd: setroubleshoot root exploit (CVE-Request)
So. Yes, thats correct: The SELinux system that is only there to protect you, passes attacker controlled data to sh -c (https://docs.python.org/2/library/commands.html) inside a daemon running as root. Sacken lassen…
Ups….