Hi all,

Just a quick question about the security of the chroot() jail
implemented by FreeVSD.

I have just read the following URL...

http://www.solucorp.qc.ca/howto.hc?projet=vserver&id=62

... and am wondering whether a default install of RH7.2 (2.4.9-34
kernel) has any "chroot breaking" exploits?

Unfortunately, I don't have a very good knowledge of C so I can not
test the exploit mentioned at the end of the page - can anyone else?

TIA.

Kind regards,

-- 
Ben Kennish
[EMAIL PROTECTED]

------------------------- The freeVSD Support List --------------------------
Subscribe:   mailto:[EMAIL PROTECTED]?body=subscribe%20freevsd-support
Unsubscribe: mailto:[EMAIL PROTECTED]?body=unsubscribe%20freevsd-support
Archives:    http://freevsd.org/support/mail-archives/freevsd-support
-----------------------------------------------------------------------------

Reply via email to