Jon wrote:

[...]


Linux kmod + ptrace local root exploit by <[EMAIL PROTECTED]>

=> Simple mode, executing /usr/bin/id > /dev/tty
sizeof(shellcode)=95
=> Child process started..........
=> Child process started..........

[...]

Does this mean the patch I downloaded worked?


Yes.

- Jon

Mmh, well, I have a non-patched 2.4.19 and so there should be the bug.
I've tried the k3m, too.
In my environment it first told me that my kernel is attackable.
I ran k3m a 2nd and 3rd time and it has only reported the "Child process started..." messages and produced child process zombies.
What is that? Is k3m buggy? Very strange...

Reply via email to