[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <b086760e0909090230v4fb13b7cs7bdefff75c113393@mail.gmail.com>
Date: Wed, 9 Sep 2009 11:30:55 +0200
From: yersinia <yersinia.spiros@...il.com>
To: full-disclosure <full-disclosure@...ts.grok.org.uk>,
dailydave <dailydave@...ts.immunitysec.com>
Subject: R. RHEL, RHCS, and Selinux : hype,
reality or dream?
So it seems that it is not necessary to be a clever hacker as spender to
disable SELinux on a system
(http://grsecurity.net/~spender/exploit.txt<http://grsecurity.net/%7Espender/exploit.txt>).
Just follow the directions of the vendor. This one require to disable
selinux for the proper function of one of its HA products, after years that
the same vendor was critical with commercial product, o badly compiled open
source for SELINUX execmem o textreloc issue, because they require the
same.
http://marc.info/?l=selinux&m=125244025732144&w=2
James Morris first answer
http://marc.info/?l=selinux&m=125245247920355&w=2
So articles like this are just marketing?
http://magazine.redhat.com/2007/05/04/whats-new-in-selinux-for-red-hat-enterprise-linux-5/
Regards
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists