Robert Michel wrote:
Salve Herbert, *!
Can somebody explain if these exploits could be used with
vservers, or does the design of versvers avoid vulnerability
in this cases?
[Full-disclosure] Linux Kernel 2.6.x PRCTL Core Dump Handling -
Local r00t Exploit ( BID 18874 / CVE-2006-2451 )
http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047831.html
Will give you root on the guest, if the guest is running crond.
[Full-disclosure] Linux kernel 0day - dynamite inside, don't burn your
fingers
http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047907.html
Won't work on a guest.
--
Daniel Hokka Zakrisson
GPG id: 06723412
GPG fingerprint: A455 4DF3 990A 431F FECA 7947 6136 DDA2 0672 3412
_______________________________________________
Vserver mailing list
Vserver@list.linux-vserver.org
http://list.linux-vserver.org/mailman/listinfo/vserver