Re: [Vserver] local kernel exploits

From: Daniel Hokka Zakrisson <daniel_at_hozac.com>
Date: Sat 15 Jul 2006 - 18:05:56 BST
Message-ID: <44B92074.70405@hozac.com>

Robert Michel wrote:
> Salve Herbert, *!
>
> Can somebody explain if these exploits could be used with
> vservers, or does the design of versvers avoid vulnerability
> in this cases?
>
> [Full-disclosure] Linux Kernel 2.6.x PRCTL Core Dump Handling -
> Local r00t Exploit ( BID 18874 / CVE-2006-2451 )
> http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047831.html

Will give you root on the guest, if the guest is running crond.

> [Full-disclosure] Linux kernel 0day - dynamite inside, don't burn your
> fingers
> http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047907.html

Won't work on a guest.

-- 
Daniel Hokka Zakrisson
GPG id: 06723412
GPG fingerprint: A455 4DF3 990A 431F FECA  7947 6136 DDA2 0672 3412
_______________________________________________
Vserver mailing list
Vserver@list.linux-vserver.org
http://list.linux-vserver.org/mailman/listinfo/vserver
Received on Sat Jul 15 18:05:44 2006
[Next/Previous Months] [Main vserver Project Homepage] [Howto Subscribe/Unsubscribe] [Paul Sladen's vserver stuff]
Generated on Sat 15 Jul 2006 - 18:05:51 BST by hypermail 2.1.8