Hi!

The method to break out of a chroot() as described in 
'http://www.bpfh.net/simes/computing/chroot-break.html' involves a chroot() call.
If I remove CAP_SYS_CHROOT for every vserver, this attack should be prevented. Are 
there any other attacks on chroot() or can I safely set the permission of /vservers 
(or whatever I use) to something different from 000?

CU/Lnx Sascha

-- 
Registered Linux User #77587 (http://counter.li.org/)

bomb terrorist afghanistan PGP encrypt CIA FBI BND MAD StaSi anschlag strike sex pussy 
xxx kill bj hitler Gates MS Windows ZV ZDV

Attachment: msg00394/pgp00000.pgp
Description: PGP signature

Reply via email to