lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040326044118.22E143A404E@abyss.simplyaquatics.com> From: edstreet at street-tek.com (Ed Street) Subject: Talk in #grsecurity I thought I would pass this blurb along, taken on #grsecurity and the subject was security. Just to let everyone know I am awaiting these exploits to be released to the respected parties in due time or an apology for falsifying these claims. Ed [22:22] <spender> is exec-shield in debian yet? [22:23] <BlackNet> i had it working under debian [22:23] <BlackNet> kernel-patch-exec-shield - Protection against stack smashing and other attacks. [22:23] <spender> i mean, is it in mainline debian [22:23] <spender> ah okay [22:23] <spender> so good i can release this exploit the day after fedora core 2 then [22:23] <spender> two birds with one stone [22:24] <BlackNet> what exploit? [22:24] <spender> i'm just lying [22:25] <spender> it doesn't exist [22:25] <spender> it didn't exist when i said it did months ago on the debian list [22:25] <spender> and it didn't exist when exec-shield was first written [22:25] <spender> so just ignore me [22:26] <BlackNet> so this hole was never fixed? [22:26] <spender> brb, setting up a fake test system with a fake exec-shield kernel to write a fake exploit [22:30] * Joins: Method [22:34] * BlackNet holds his breath and passes out from the excitment [22:34] <spender> there are 2 holes really [22:34] <spender> so i'll release just one [22:35] <spender> and then state my intent to release the second in 3 months [22:35] <BlackNet> care to share some details on the first one? [22:35] <spender> nah [22:35] <spender> well, the one is very serious [22:35] <spender> the other is serious, but only in certain situations [22:35] <BlackNet> who found it? [22:36] <spender> me [22:36] <BlackNet> well congrats [22:36] <spender> i found it the day exec-shield was released [22:37] <BlackNet> so when's the release date [22:37] <spender> when would be the best time after fedora core 2 is out? [22:37] <spender> that's what i'm waiting on [22:37] <BlackNet> why wait? [22:37] <spender> but i'd like for it to be installed on a couple machines first [22:37] <spender> so there's a real threat [22:38] <spender> would a gtk or qt exploit be good too? [22:38] <BlackNet> send 'em in if you have 'em [22:38] <spender> oh i'll send it in [22:40] <BlackNet> how many do you have that's not released? [22:41] <spender> 2 for exec-shield [22:41] <spender> 3 for systrace [22:41] <spender> 1 for DTE [22:41] <spender> ~10 for LIDS [22:42] <BlackNet> that's alot [22:42] <spender> oh [22:42] <spender> 3 i think for linsec [22:43] <BlackNet> all of these are non-reported? [22:43] <spender> correct [22:43] <spender> well [22:43] <spender> 1 lids and DTE bug i released recently [22:43] <BlackNet> wow you do some work [22:43] <spender> to a channel of blackhats [22:43] <spender> it's the same bug, just present in both [22:44] <BlackNet> ah [22:44] <BlackNet> so which one you going to release first? [22:44] <spender> hmm [22:45] <spender> i think the serious one [22:45] <spender> so there's no chance that it can be spun in any way to allow it to be ignored --- Outgoing mail is certified Virus Free. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.631 / Virus Database: 404 - Release Date: 3/17/2004 -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040325/d882c3ba/attachment.html
Powered by blists - more mailing lists