Jon wrote:
[...]
Linux kmod + ptrace local root exploit by <[EMAIL PROTECTED]>
=> Simple mode, executing /usr/bin/id > /dev/tty
sizeof(shellcode)=95
=> Child process started..........
=> Child process started..........
[...]
Does this mean the patch I downloaded worked?
Yes.
- Jon
Mmh, well, I have a non-patched 2.4.19 and so there should be the bug.
I've tried the k3m, too.
In my environment it first told me that my kernel is attackable.
I ran k3m a 2nd and 3rd time and it has only reported the "Child process
started..." messages and produced child process zombies.
What is that? Is k3m buggy? Very strange...