<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
</head>
<body bgcolor="#ffffff" text="#000000">
Greetings all,<br>
<pre> This advisory just made it's way to me. I have yet to locate a proof of concept test to verify this vulnerability. I felt the best course of action is ask the experts here if the current stable 2.6 release (<span
class="bodytitle"></span><a
href="http://www.grsecurity.net/grsecurity-2.1.8-2.6.14.6-200601211647.patch.gz">grsecurity-2.1.8-2.6.14.6-200601211647</a>) is sufficient to protect against this.
Regards,
Les
-----Original Message-----
From: Secunia Security Advisories [<a class="moz-txt-link-freetext" href="mailto:sec-adv@secunia.com">mailto:sec-adv@secunia.com</a>]
TITLE:
Linux Kernel "prctl" Privilege Escalation Vulnerability
SECUNIA ADVISORY ID:
SA20953
VERIFY ADVISORY:
<a class="moz-txt-link-freetext" href="http://secunia.com/advisories/20953/">http://secunia.com/advisories/20953/</a>
CRITICAL:
Less critical
IMPACT:
Security Bypass, Privilege escalation
WHERE:
Local system
OPERATING SYSTEM:
Linux Kernel 2.6.x
<a class="moz-txt-link-freetext" href="http://secunia.com/product/2719/">http://secunia.com/product/2719/</a>
DESCRIPTION:
A vulnerability has been reported in the Linux Kernel, which can be
exploited by malicious, local users to bypass certain security restrictions
or potentially gain escalated privileges.
The vulnerability is caused due to improper handling of core dumps.
This can be exploited to dump core files into usually restricted directories
or potentially gain root privileges.
SOLUTION:
Update to version 2.6.17.4.
<a class="moz-txt-link-freetext" href="http://www.kernel.org/">http://www.kernel.org/</a>
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Red Hat.
ORIGINAL ADVISORY:
<a class="moz-txt-link-freetext" href="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.4">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.4</a>
</pre>
<br>
<pre class="moz-signature" cols="72">--
Regards,
Les F.
<a class="moz-txt-link-freetext" href="http://www.JaguarPC.com">http://www.JaguarPC.com</a>
Phone 1.800.558.5869
Fax 1.713.960.1581</pre>
</body>
</html>