SELinux is bypassed again
The security researcher Sebastian Krahmer of GNU/Linux vendor SUSE Linux again bypasses SELinux after publicly bypassing the PoC of SELinux's CVE-2015-1815, this public PoC can work normally in CentOS 6.6, in 6.8 and 7, because RHEL and CentOS share the same code, Sebastian believes that part of The SELinux kernel code is of good quality, but the user space framework is huge and has many defects, setroubleshoot is a daemon process written in python that will be activated by the ghost service. The defects of this program "Contribute" root permissions to attackers, sebastian's PoC shows a way to bypass SELinux without any kernel vulnerabilities. kernel security is another topic that should be discussed with the PaX/Grsecurity community, however, Sebastian affirmed the value of MAC (Mandatory Access Control.
Security Context of SELinux
An SSH Public Key Authentication Failure Caused by SELinux
Getting started with SELinux
Simple SELinux Configuration
How to quickly disable SELinux in CentOS
How to disable SELinux in CentOS/RHEL
This article permanently updates the link address: