Re: A casestudy where selinux has stopped malware attacks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

Please read about SELinux here:

http://selinuxproject.org/page/FAQ


MAC in case of SeLinux or DAC (Discretionary Access Control)  are there to control the extent of which a user or process can access or interact with resources.

They by nature may sandbox an attack, but are not there to stop malware attacks.
They may mitigate some of them like this one: (Exactly serving one of its purposes)

CVE-2016-9962 docker: insecure opening of file-descriptor allows privilege escalation:

http://rhelblog.redhat.com/2017/01/13/selinux-mitigates-container-vulnerability/


Mitigating is not stopping, you still need to patch the vulnerability, and it is not necessarily for all kind of malware or cases of malware, it depends on malware , your setting, the environment and etc.

You may not deploy Selinux and think you stopped all attacks, it is just false sense of security.

P.S. With Special thanks to Dan Walsh of RedHat


Best regards,
-- 
 Patrick K.
On 9/21/2017 12:13 AM, masoom alam wrote:
Hi every one, 

Do we have some thing like the mentioned subject documented?

Thank you. 


----
Dr. Masoom Alam,
Associate Professor,
Department of Computer Science,
COMSATS Institute of Information Technology,
Park Road, Islamabad
Off +92-51-9049-5391
Cell +92-332-9298-404


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux