On Sat, 30 Dec 2006, Colin Percival wrote:
Bill Moran wrote:
You also describe a scenerio where a user can create a jail of his own
design and give himself root inside it, thus allowing him to use the setuid
trick to get root on the host as well. The place this falls down is that
the user
Bill Moran wrote:
You also describe a scenerio where a user can create a jail of his own
design and give himself root inside it, thus allowing him to use the
setuid trick to get root on the host as well. The place this falls down
is that the user would need to already have root to create the
Bill Moran wrote:
http://people.collaborativefusion.com/~wmoran/code/jailme.html
Feedback is appreciated.
Be very very careful. Both chroot(2) and jail(2) can only be called by
root, and for very good reasons. Unprivileged users can create hardlinks
to files which they don't own, including
In response to Colin Percival [EMAIL PROTECTED]:
Bill Moran wrote:
http://people.collaborativefusion.com/~wmoran/code/jailme.html
Feedback is appreciated.
Be very very careful. Both chroot(2) and jail(2) can only be called by
root, and for very good reasons. Unprivileged users can
http://people.collaborativefusion.com/~wmoran/code/jailme.html
Feedback is appreciated.
--
Bill Moran
Collaborative Fusion Inc.
[EMAIL PROTECTED]
Phone: 412-422-3463x4023
IMPORTANT: This message contains confidential
5 matches
Mail list logo