From Bugzilla Helper: User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; cs-CZ; rv:1.4) Gecko/20030624 Description of problem: The latest kernel from RHEN updates (kernel 2.4.9-e.25.smp) is still vulnerable to ptrace exploit (from march 2003), available e.g. from http://hysteria.sk/sd/p.c. We have checked that some form of ptrace patch is included in the src.rpm package. Version-Release number of selected component (if applicable): kernel 2.4.9-e.25.smp How reproducible: Always Steps to Reproduce: 1. login as normal user 2. compile ptrace_exploit.c 3. run ./ptrace_exploit Actual Results: you've got root's shell Expected Results: ptrace exploit shouldn't get root's priviledges Additional info:
be careful; if you tested this exploit before you updated the kernel as well, it will have made itself setuid root..... so it appears to have succeeded. Is this the case ?
Yes, we have had the binary setuid root. Sorry.