Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170621212835.GA28151@localhost.localdomain>
Date: Wed, 21 Jun 2017 14:28:35 -0700
From: Qualys Security Advisory <qsa@...lys.com>
To: Solar Designer <solar@...nwall.com>
Cc: oss-security@...ts.openwall.com
Subject: Re: Qualys Security Advisory - The Stack Clash

Hi Solar, all,

On Tue, Jun 20, 2017 at 03:22:04PM +0200, Solar Designer wrote:
> Qualys, I suggest that, like you did with the Sudo exploit, you publish
> your Stack Clash exploits in here as soon as third-party exploits of
> comparable functionality appear, or next Tuesday, whichever is earlier.

We have discussed this internally, and we will first publish the Stack
Clash exploits and proofs-of-concepts that we sent to the distros@ and
linux-distros@ lists, plus our Linux ld.so exploit for amd64, and our
Solaris rsh exploit.

We will do so next Tuesday, but we will publish our Linux exploits and
proofs-of-concept if and only if Fedora updates are ready by then, our
NetBSD proof-of-concept if and only if NetBSD patches are ready by then,
and our FreeBSD proofs-of-concept if and only if FreeBSD patches are
ready by then.

If someone happens to know of another major distribution that has not
published patches and updates yet, please let us all know by replying
here to oss-security. Thank you very much!

With best regards,

-- 
the Qualys Security Advisory team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.