Jon wrote: [...]
Linux kmod + ptrace local root exploit by <anszom@v-lo.krakow.pl> => Simple mode, executing /usr/bin/id > /dev/tty sizeof(shellcode)=95 => Child process started.......... => Child process started..........
[...]
Does this mean the patch I downloaded worked?Yes. - Jon
Mmh, well, I have a non-patched 2.4.19 and so there should be the bug. I've tried the k3m, too. In my environment it first told me that my kernel is attackable.I ran k3m a 2nd and 3rd time and it has only reported the "Child process started..." messages and produced child process zombies.
What is that? Is k3m buggy? Very strange...