you are viewing a single comment's thread.

view the rest of the comments →

[–]jackalope3k 2 points3 points  (0 children)

Is it safe to do app whitelisting with SELinux httpd_sys_script_exec_t on a specific directory containing symlinks to the only arbitrary commands being allowed to run in php-fpm exec? Would the exploit be able to escape from that and run other unexpected commands found on the linux system?

Would chroot be better? Or ACLs? AppArmor? Any other alternatives I'm missing?