All, I just patched my kernel with the patch available on kernel.org. I downloaded, compiled and ran the km3.c exploit for this bug. How can I tell if the exploit failed or not? When I run the exploit as non-root it keeps starting children over and over again. When I run it as root it does the following:
Linux kmod + ptrace local root exploit by <[EMAIL PROTECTED]> => Simple mode, executing /usr/bin/id > /dev/tty sizeof(shellcode)=95 => Child process started.......... => Child process started.+ 2131 uid=0(root) gid=0(root) groups=0(root) - 2131 ok! As non-root: Linux kmod + ptrace local root exploit by <[EMAIL PROTECTED]> => Simple mode, executing /usr/bin/id > /dev/tty sizeof(shellcode)=95 => Child process started.......... => Child process started.......... => Child process started.......... => Child process started.......... => Child process started.......... => Child process started.......... => Child process started.......... => Child process started.......... => Child process started.......... => Child process started.......... => Child process started.......... Does this mean the patch I downloaded worked? Thanks, -- Phil PGP/GPG Key: http://www.zionlth.org/~plhofmei/ wget -O - http://www.zionlth.org/~plhofmei/key.txt | gpg --import -- Excuse #15: Fat electrons in the lines
pgp00000.pgp
Description: PGP signature