Hi all, Just a quick question about the security of the chroot() jail implemented by FreeVSD.
I have just read the following URL... http://www.solucorp.qc.ca/howto.hc?projet=vserver&id=62 ... and am wondering whether a default install of RH7.2 (2.4.9-34 kernel) has any "chroot breaking" exploits? Unfortunately, I don't have a very good knowledge of C so I can not test the exploit mentioned at the end of the page - can anyone else? TIA. Kind regards, -- Ben Kennish [EMAIL PROTECTED] ------------------------- The freeVSD Support List -------------------------- Subscribe: mailto:[EMAIL PROTECTED]?body=subscribe%20freevsd-support Unsubscribe: mailto:[EMAIL PROTECTED]?body=unsubscribe%20freevsd-support Archives: http://freevsd.org/support/mail-archives/freevsd-support -----------------------------------------------------------------------------
