<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
</head>
<body bgcolor="#ffffff" text="#000000">
Greetings all,<br>
<pre>  This advisory just made it's way to me.  I have yet to locate a proof of concept test to verify this vulnerability.  I felt the best course of action is ask the experts here if the current stable 2.6 release (<span
 class="bodytitle"></span><a
 href="http://www.grsecurity.net/grsecurity-2.1.8-2.6.14.6-200601211647.patch.gz">grsecurity-2.1.8-2.6.14.6-200601211647</a>) is sufficient to protect against this.  

  Regards,
    Les

-----Original Message-----
From: Secunia Security Advisories [<a class="moz-txt-link-freetext" href="mailto:sec-adv@secunia.com">mailto:sec-adv@secunia.com</a>] 

TITLE:
Linux Kernel "prctl" Privilege Escalation Vulnerability

SECUNIA ADVISORY ID:
SA20953

VERIFY ADVISORY:
<a class="moz-txt-link-freetext" href="http://secunia.com/advisories/20953/">http://secunia.com/advisories/20953/</a>

CRITICAL:
Less critical

IMPACT:
Security Bypass, Privilege escalation

WHERE:
Local system

OPERATING SYSTEM:
Linux Kernel 2.6.x
<a class="moz-txt-link-freetext" href="http://secunia.com/product/2719/">http://secunia.com/product/2719/</a>

DESCRIPTION:
A vulnerability has been reported in the Linux Kernel, which can be
exploited by malicious, local users to bypass certain security restrictions
or potentially gain escalated privileges.

The vulnerability is caused due to improper handling of core dumps.
This can be exploited to dump core files into usually restricted directories
or potentially gain root privileges.

SOLUTION:
Update to version 2.6.17.4.
<a class="moz-txt-link-freetext" href="http://www.kernel.org/">http://www.kernel.org/</a>

PROVIDED AND/OR DISCOVERED BY:
The vendor credits Red Hat.

ORIGINAL ADVISORY:
<a class="moz-txt-link-freetext" href="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.4">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.4</a>


</pre>
<br>
<pre class="moz-signature" cols="72">-- 
  Regards,
    Les F.
    <a class="moz-txt-link-freetext" href="http://www.JaguarPC.com">http://www.JaguarPC.com</a>
    Phone 1.800.558.5869
    Fax 1.713.960.1581</pre>
</body>
</html>