On Mon, Dec 22, 2003 at 11:48:08PM +0100, Herbert Poetzl wrote:
> On Mon, Dec 22, 2003 at 08:35:36PM -0000, Lu?s Miguel Silva wrote:
> >    Hello all,
> > 
> >    I  know  the do_brk vulnerability is "a thing of the past" but, I just
> >    tried out the exploit on one of my vservers just to see what happened.
> 
> [exploit attempt censored ;]
> 
> >    And  now for a developer question: is a local kernel root exploit able
> >    to break the vserver environment?
> 
> depends on the kind of exploit ...
> 
> approaches modifying kernel structures could
> be used to 'escape' the context, thus gaining
> host administator powers ...

The recent ptrace()/execve() exploit for x<=2.4.20 dropped the exploiter
into the root vserver even though the exploit was run inside a vserver.
I think thi was because the the modprobe it attached to was running as
CTX-0.

So I wouldn't be surprised if another kernel exploit would also be able
to break out of a vserver. It only protects against userlevel exploits.

Regards,

Erik Smit
_______________________________________________
Vserver mailing list
[EMAIL PROTECTED]
http://list.linux-vserver.org/mailman/listinfo/vserver

Reply via email to