Nick,



am [09 May 2001 12:08:50 +0100] schrieb Nick Burrett <[EMAIL PROTECTED]> :

> Ben Kennish <[EMAIL PROTECTED]> writes:
> 
> > Ouch, Nick - you're right.
> > 
> > http://www.bpfh.net/simes/computing/chroot-break.html
> > 
> > ..makes for painful reading.  I assume that the only way to 
> > prevent this is to stop root access to any VSes?
> 
> Almost impossible.  But there are Linux kernel hacks around that the chroot
> problem. 

Do you have any link?

Do you have an suggestion which suid program on the skel could be
vulnerable?

jimmy

>  
> 
> Nick.
> 
> > 
> > 
> > Nick Burrett wrote:
> > > 
> > > Marcos Rubinstein ALPA WWW <[EMAIL PROTECTED]> writes:
> > > 
> > > > Sorry to change the subject... but my question now is:
> > > >
> > > > lets asume that root is compromised in a vs by the admin...
> > > >
> > > > the most obvious problem would be that then the skel could be compromised
> > > > (any modification to a file that is a hard link of the skel would modify
> > > > the skel and those files in other VS's)...
> > > >
> > > > Also, perhaps, that unscrupolous admin could change his
> > > > quota. (/etc/vsd/quota)...
> > > >
> > > > but, could s/he compromise (have access) to any other vs or the
> > > > "host" server?
> > > 
> > > using Google, try entering "breaking a chroot jail".  It's bad news.
> > > 
> > > Nick.

James T. Koerting
 
KSD Germany
[EMAIL PROTECTED]
 
Murphy's Law: "Anything that can go wrong, will go wrong"
Parkinson's Law: "Work expands to exceed available time"
Koerting's Law: "Don't fight against these laws"

Reply via email to