Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Mon, 21 Oct 2002 16:23:26 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Mon, 21 Oct 2002 16:23:26 -0400 Received: from pD953048C.dip.t-dialin.net ([217.83.4.140]:26632 "EHLO calista.inka.de") by vger.kernel.org with ESMTP id ; Mon, 21 Oct 2002 16:23:26 -0400 Date: Mon, 21 Oct 2002 22:29:31 +0200 To: linux-kernel@vger.kernel.org Subject: Re: can chroot be made safe for non-root? Message-ID: <20021021202931.GA25035@lina.inka.de> References: <200210201715.07150.landley@trommello.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <200210201715.07150.landley@trommello.org> User-Agent: Mutt/1.4i From: Bernd Eckenfels Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 523 Lines: 13 On Sun, Oct 20, 2002 at 05:15:07PM -0500, Rob Landley wrote: > Anything that wants to look at /etc/password or /etc/shadow comes to mind. only if it runs with elevated priveledges. If it is started under a users chroot, the eleated privs come from suid/sgid. Greetings Bernd - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/