Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 3 Oct 2017 10:08:20 -0700
From: Qualys Security Advisory <qsa@...lys.com>
To: oss-security@...ts.openwall.com
Subject: Re: Qualys Security Advisory - Linux PIE/stack corruption
 (CVE-2017-1000253)

Hi all,

On Tue, Sep 26, 2017 at 08:08:25AM -0700, Qualys Security Advisory wrote:
> As a proof-of-concept, we will publish CVE-2017-1000253.c

Since CentOS 7 patched this vulnerability on September 13, 2017 (release
1708), we attached our CVE-2017-1000253.c exploit for CentOS-7 kernel
versions "3.10.0-514.21.2.el7.x86_64" and "3.10.0-514.26.1.el7.x86_64"
to this email (alternatively, this exploit is also available at
https://www.qualys.com/research/security-advisories/).

Thank you very much!  With best regards,

-- 
the Qualys Security Advisory team

View attachment "CVE-2017-1000253.c" of type "text/plain" (15548 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.