Red Hat Bugzilla – Bug 88615
known ptrace exploits are not killed after failed execution causing high load on the system
Last modified: 2007-04-18 12:52:57 EDT
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.2.1) Gecko/20030225
Description of problem:
When you try to execute ptrace kernel exploit on the system, the exploit
procedure is terminated due to the fact that operation is not permitted. Alas,
the process itself still remains in the memory causing high load on the system.
exploit source can be found from http://www.lazarenko.net/ptrace.c
Version-Release number of selected component (if applicable):
Steps to Reproduce:
1. cc -o ptrace ptrace.c
3. ps axuw | grep ptrace
Actual Results: ptrace process, which supposed to be killed, remained in memory
slowly eating processor time, up to 100%.
Expected Results: Process should have been killed completely, as it happens in
2.4.21-pre* kernel branch.
I apologize, ptrace.c is available on that URL now.
This should be fixed by RHSA-2003:172
please reopen this bug if you still see this behaviour.