As part of university assignment I'm researching the ways an attacker can bypass chroot jail. Naturally, I've seen that there are plenty of ways to attempt privilege escalation using vulnerable setuid executables, dirty cow, and other exploits which makes escaping the jail trivial.
However, I'm curios if there are any ways attacker can harm the system while remaining in chroot jail. Since to my knowledge chroot was never intended as a sandboxing tool, I feel like it might be the case.
For example, can a fork bomb launched in chroot jail consume process space of a system? Since chroot only changes the visible scope for directories that sounds possible.
chroot
. – Jim L. Jun 06 '23 at 22:35