I'm running vserver 1.26 on 2.4.25 (with some additional patches like grsecurity, evms and reiserfsquota). I thought that setup would work and not be exploitable when I do:
chmod 000 /vservers chattr =t /vservers but, the exploit works nontheless. If it matters, I use reiserfs as my filesystem, every vserver have their filesystem mounted /vservers/<avserver>. Also, just to make it clear, you don't have to restart a vserver to test exploitability just reset the permissions and attributes that the exploit changes? (I've tried that also, but I don't think it is necessary). Hope someone can pinpoint what I'm doing wrong, .. thanks:) -- -- Asbj�rn Sannes [EMAIL PROTECTED] www.sannes.org _______________________________________________ Vserver mailing list [EMAIL PROTECTED] http://list.linux-vserver.org/mailman/listinfo/vserver
