From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; cs-CZ; rv:1.4) Gecko/20030624
Description of problem:
The latest kernel from RHEN updates (kernel 2.4.9-e.25.smp) is still vulnerable
to ptrace exploit (from march 2003), available e.g. from
http://hysteria.sk/sd/p.c. We have checked that some form of ptrace patch is
included in the src.rpm package.
Version-Release number of selected component (if applicable):
Steps to Reproduce:
1. login as normal user
2. compile ptrace_exploit.c
3. run ./ptrace_exploit
Actual Results: you've got root's shell
Expected Results: ptrace exploit shouldn't get root's priviledges
be careful; if you tested this exploit before you updated the kernel as well, it
will have made itself setuid root..... so it appears to have succeeded.
Is this the case ?
Yes, we have had the binary setuid root. Sorry.