Robert Michel wrote:
> Salve Herbert, *!
>
> Can somebody explain if these exploits could be used with
> vservers, or does the design of versvers avoid vulnerability
> in this cases?
>
> [Full-disclosure] Linux Kernel 2.6.x PRCTL Core Dump Handling -
> Local r00t Exploit ( BID 18874 / CVE-2006-2451 )
> http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047831.html
Will give you root on the guest, if the guest is running crond.
> [Full-disclosure] Linux kernel 0day - dynamite inside, don't burn your
> fingers
> http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047907.html
Won't work on a guest.
-- Daniel Hokka Zakrisson GPG id: 06723412 GPG fingerprint: A455 4DF3 990A 431F FECA 7947 6136 DDA2 0672 3412 _______________________________________________ Vserver mailing list Vserver@list.linux-vserver.org http://list.linux-vserver.org/mailman/listinfo/vserverReceived on Sat Jul 15 18:05:44 2006