lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <3D739145.3040802@snosoft.com> From: dotslash at snosoft.com (KF) Subject: Happy Labor Day from Snosoft For your reading pleasure I have attached some of the communication between myself and CERT regarding the issues recently released at: ftp://ftp1.support.compaq.com/public/unix/v5.1/T64V51B19-C0136901-15143-ES-20020817.txt We are in the process of making our formal advisories out of these "potential" issues. Once that process is done we will release the exploits we have been holding for several months. At that point will also be putting out a white paper explaining the 3 methods used to bypass the non-exec stack. Please note the 45 day CERT grace period has expired as well as an addtional complementary 8 day extension that Compaq requested. -KF P.S. cert-issues-071202.txt is probably the file you wanna read. -------------- next part -------------- A non-text attachment was scrubbed... Name: Happy_labor_day.tar Type: application/x-tar Size: 20480 bytes Desc: not available Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20020902/b42b69ca/Happy_labor_day.tar