|
Message-ID: <20170621212835.GA28151@localhost.localdomain> Date: Wed, 21 Jun 2017 14:28:35 -0700 From: Qualys Security Advisory <qsa@...lys.com> To: Solar Designer <solar@...nwall.com> Cc: oss-security@...ts.openwall.com Subject: Re: Qualys Security Advisory - The Stack Clash Hi Solar, all, On Tue, Jun 20, 2017 at 03:22:04PM +0200, Solar Designer wrote: > Qualys, I suggest that, like you did with the Sudo exploit, you publish > your Stack Clash exploits in here as soon as third-party exploits of > comparable functionality appear, or next Tuesday, whichever is earlier. We have discussed this internally, and we will first publish the Stack Clash exploits and proofs-of-concepts that we sent to the distros@ and linux-distros@ lists, plus our Linux ld.so exploit for amd64, and our Solaris rsh exploit. We will do so next Tuesday, but we will publish our Linux exploits and proofs-of-concept if and only if Fedora updates are ready by then, our NetBSD proof-of-concept if and only if NetBSD patches are ready by then, and our FreeBSD proofs-of-concept if and only if FreeBSD patches are ready by then. If someone happens to know of another major distribution that has not published patches and updates yet, please let us all know by replying here to oss-security. Thank you very much! With best regards, -- the Qualys Security Advisory team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.