Hi! The method to break out of a chroot() as described in 'http://www.bpfh.net/simes/computing/chroot-break.html' involves a chroot() call. If I remove CAP_SYS_CHROOT for every vserver, this attack should be prevented. Are there any other attacks on chroot() or can I safely set the permission of /vservers (or whatever I use) to something different from 000?
CU/Lnx Sascha -- Registered Linux User #77587 (http://counter.li.org/) bomb terrorist afghanistan PGP encrypt CIA FBI BND MAD StaSi anschlag strike sex pussy xxx kill bj hitler Gates MS Windows ZV ZDV
msg00394/pgp00000.pgp
Description: PGP signature
