Subject: re: i386 IO access and chroot()
To: gabriel rosenkoetter <email@example.com>
From: matthew green <firstname.lastname@example.org>
Date: 07/18/2001 00:45:10
Considering our default install boots only to secure level 1, I
don't see that case as particularly boring.
it's boring simply because: i can write to the raw disk, and if i can
do that, i can do pretty much what ever i want...
if there are actual exploits for this from securelevel 2, i'm very
interested to hear about them.