Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 7 Aug 2017 09:55:36 -0400 (EDT)
From: Vladis Dronov <vdronov@...hat.com>
To: oss-security@...ts.openwall.com, Brad Spengler <spender@...ecurity.net>
Subject: Re: [CVE-2017-7533] kernel: inotify: a race between
 inotify_handle_event() and sys_rename()

Hello, Brad,

Indeed, the wording "in the wild" is probably incorrect. The mentioned exploit was developed by the
flaw researchers and we are not aware of it being available to or used by anyone else. We are sorry
for this misinformation.

As for the timeline as we understand it, we were notified about the flaw, we've discovered the flaw
being actually already fixed in the upstream, we've notified linux-distros@ and in a week we've made
this public announce.

Best regards,
Vladis Dronov | Red Hat, Inc. | Product Security Engineer

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.