<div dir="ltr">Hello,<div><br></div><div>I recently saw this:</div><div><br></div><div><a href="https://www.centos.org/modules/newbb/viewtopic.php?topic_id=42827&forum=59">https://www.centos.org/modules/newbb/viewtopic.php?topic_id=42827&forum=59</a><br>
</div><div><br></div><div style>Given a command prompt, download this exploit, compile it, run it... and you suddenly have root. What is interesting about this is, as soon as you have root, you can disable SELinux.</div>
<div style><br></div><div style>Apparently it can be mitigated using this kernel module:</div><div style><br></div><div style><a href="http://elrepo.org/tiki/kmod-tpe">http://elrepo.org/tiki/kmod-tpe</a><br></div><div style>
<br></div><div style>I spun up a test VM and tested this - it works! What would be interesting is doing some investigation to see if SELinux could prevent damage if this code was run from a malicious web app instead of the command prompt.</div>
<div style><br></div><div style>Also, I wonder if this works on Scientific Linux and other RHEL derivatives, or RHEL itself?</div><div style><br></div><div style>Cheers,</div><div style>-JK</div></div>