Date: Wed, 14 Jun 2017 09:59:26 -0700 From: Qualys Security Advisory <qsa@...lys.com> To: oss-security@...ts.openwall.com Subject: Re: Qualys Security Advisory - CVE-2017-1000367 in Sudo's get_process_ttyname() for Linux Hi all, Since a working exploit has been published already (https://github.com/c0d3z3r0/sudo-CVE-2017-1000367), please find our Sudoer-to-root exploit (Linux_sudo_CVE-2017-1000367.c) attached to this mail. Thank you very much! With best regards, -- the Qualys Security Advisory team View attachment "Linux_sudo_CVE-2017-1000367.c" of type "text/plain" (4705 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ