Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Wed, 19 Mar 2003 09:03:06 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Wed, 19 Mar 2003 09:03:06 -0500 Received: from [64.76.155.81] ([64.76.155.81]:18304 "EHLO alumno.inacap.cl") by vger.kernel.org with ESMTP id ; Wed, 19 Mar 2003 09:03:04 -0500 Date: Wed, 19 Mar 2003 10:13:57 -0400 (CLT) From: Robinson Maureira Castillo To: Andrus cc: linux-kernel@vger.kernel.org Subject: Re: Kernels 2.2 and 2.4 exploit (ALL VERSION WHAT I HAVE TESTED UNTILL NOW!) In-Reply-To: <000001c2ee1f$02da6820$0100a8c0@andrus> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 699 Lines: 25 On Wed, 19 Mar 2003, Andrus wrote: > You can download working exploit on > http://www.members.ee/ptrace-exploit.c > > Its hell long exploit as I know, and still not patched! > I have it, it's no longer on that URL, but I test it against the last errata kernel from RedHat and it's not vulnerable. [rmaureira@linux rmaureira]$ ./ptrace-xploit [-] Unable to attach: Operation not permitted Killed Best regards -- Robinson Maureira Castillo INACAP - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/