Robert Michel wrote:
Salve Herbert, *!

Can somebody explain if these exploits could be used with
vservers, or does the design of versvers avoid vulnerability
in this cases?

[Full-disclosure] Linux Kernel 2.6.x PRCTL Core Dump Handling -
Local r00t Exploit ( BID 18874 / CVE-2006-2451 ) http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047831.html

Will give you root on the guest, if the guest is running crond.

[Full-disclosure] Linux kernel 0day - dynamite inside, don't burn your
fingers http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047907.html

Won't work on a guest.

--
Daniel Hokka Zakrisson
GPG id: 06723412
GPG fingerprint: A455 4DF3 990A 431F FECA  7947 6136 DDA2 0672 3412
_______________________________________________
Vserver mailing list
Vserver@list.linux-vserver.org
http://list.linux-vserver.org/mailman/listinfo/vserver

Reply via email to