Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 6 May 2011 16:38:34 +0100
From:      Chris Rees <utisoft@gmail.com>
To:        Daniel Jacobsson <daniel.jacobsson.90@gmail.com>
Cc:        freebsd-security@freebsd.org
Subject:   =?iso-8859-1?q?Re=3A_Rooting_FreeBSD_=2C_Privilege_Escalation_us?= =?iso-8859-1?q?ing_Jails_=28P=E9tur=29?=
Message-ID:  <BANLkTik5dxFTiP%2BgHAhPJuRUoEsUWzEE4g@mail.gmail.com>

next in thread | raw e-mail | index | archive | help
On 6 May 2011 16:27, "Daniel Jacobsson" <daniel.jacobsson.90@gmail.com>
wrote:
>
> Daniel Jacobsson skrev 2011-05-06 17:05:
>>
>> I read this (http://www.petur.eu/blog/?p=459) blog post today. It's about
that a remote user with root privilegs to a FreeBSD jail & user privileges
to the jails host machine can obtain root privileges on the host machine.
>> Can someone confirm if this bugg/exploit works?
>
> Ah, think i found an old post (
http://freebsd.1045724.n5.nabble.com/Thoughts-on-jail-privilege-FAQ-submission-td4219099.html)
about this subject, so it seems to be old news.

Oops, looks like I broke my promise to make a doc entry...

Thanks for reminding me!

Chris



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?BANLkTik5dxFTiP%2BgHAhPJuRUoEsUWzEE4g>