K 10
svn:author
V 3
bcr
K 8
svn:date
V 27
2011-05-08T12:11:22.000000Z
K 7
svn:log
V 521
Jails have a problem in that if the jail directory is world-readable, an
attacker with root access to the jail can create a setuid binary for their
own use in the host environment (if they also have this access), thus
breaking root in the host.

This exploit is impossible if the jail's files are not world-readable.
Add instructions to the handbook on how to create a jail with the
correct permissions set.

PR: 			docs/156853
Submitted by: 	Chris Rees (utisoft at gmail dot com)
Reviewed by: 	cperciva (security parts)

END
