Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 3 Oct 2017 10:08:20 -0700
From: Qualys Security Advisory <qsa@...lys.com>
To: oss-security@...ts.openwall.com
Subject: Re: Qualys Security Advisory - Linux PIE/stack corruption
 (CVE-2017-1000253)

Hi all,

On Tue, Sep 26, 2017 at 08:08:25AM -0700, Qualys Security Advisory wrote:
> As a proof-of-concept, we will publish CVE-2017-1000253.c

Since CentOS 7 patched this vulnerability on September 13, 2017 (release
1708), we attached our CVE-2017-1000253.c exploit for CentOS-7 kernel
versions "3.10.0-514.21.2.el7.x86_64" and "3.10.0-514.26.1.el7.x86_64"
to this email (alternatively, this exploit is also available at
https://www.qualys.com/research/security-advisories/).

Thank you very much!  With best regards,

-- 
the Qualys Security Advisory team

View attachment "CVE-2017-1000253.c" of type "text/plain" (15548 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ