Re: [oss-security] Out-of-bounds read & write in the glibc's qsort()

2024-06-25 Thread Qualys Security Advisory
ite this detailed analysis! We are extremely happy that our advisory has been useful. With best regards, -- the Qualys Security Advisory team

[oss-security] CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems

2024-07-01 Thread Qualys Security Advisory
Qualys Security Advisory regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387) Contents Summary SSH-2.0-OpenSSH_

Re: [oss-security] CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems

2024-07-03 Thread Qualys Security Advisory
g limits along the way, but the first one is PACKET_MAX_SIZE, which limits the size of a packet (and hence the strings it contains) to 256KB (and this is pre-authentication, so no compression tricks are possible, here). Thank you very much! With best regards, -- the Qualys Security Advisory team

[oss-security] Re: CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems

2024-07-03 Thread Qualys Security Advisory
With best regards, -- the Qualys Security Advisory team

Re: [oss-security] CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems

2024-07-03 Thread Qualys Security Advisory
s Qualys for the outstanding research and detailed report (as always). Thank you very much for your kind words! With best regards, -- the Qualys Security Advisory team

[oss-security] Local Privilege Escalations in needrestart

2024-11-19 Thread Qualys Security Advisory
Qualys Security Advisory LPEs in needrestart (CVE-2024-48990, CVE-2024-48991, CVE-2024-48992, CVE-2024-10224, and CVE-2024-11003) Contents Summary

[oss-security] CVE-2025-0395: Buffer overflow in the GNU C Library's assert()

2025-01-22 Thread Qualys Security Advisory
curity team. We are of course at your disposal for questions, comments, and further discussions. Thank you very much! With best regards, -- the Qualys Security Advisory team While looking into commit 6f0ea84 ("assert:

[oss-security] Re: CVE-2025-0395: Buffer overflow in the GNU C Library's assert()

2025-01-23 Thread Qualys Security Advisory
Hi all, On Wed, Jan 22, 2025 at 01:41:36PM +, Qualys Security Advisory wrote: > Today (January 22, 2025) a Bugzilla entry and a patch proposal for this > vulnerability have been published: The final patch has already been committed and backported, all the links are available in Bu

[oss-security] Three bypasses of Ubuntu's unprivileged user namespace restrictions

2025-03-27 Thread Qualys Security Advisory
Qualys Security Advisory Three bypasses of Ubuntu's unprivileged user namespace restrictions Contents Summary Bypass via aa-exec Bypas

Re: [oss-security] expat vulnerability CVE-2024-8176 / impact of recursion stack overflow vulnerabilities

2025-03-15 Thread Qualys Security Advisory
icular C) > software: it kills and will kill again. :-) Also: https://www.openwall.com/lists/oss-security/2025/03/15/1 Thank you very much! With best regards, -- the Qualys Security Advisory team

Re: [oss-security] CVE-2025-0395: Buffer overflow in the GNU C Library's assert()

2025-04-24 Thread Qualys Security Advisory
be exploitable, but we have not investigated it further for now because we do not know any multithreaded SUID program that contains a reachable assertion failure. Thanks again, and hopefully this helps! With best regards, -- the Qualys Security Advisory team

[oss-security] MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client

2025-02-18 Thread Qualys Security Advisory
Qualys Security Advisory CVE-2025-26465: MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client CVE-2025-26466: DoS attack against OpenSSH's client and server ===

Re: [oss-security] MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client

2025-03-10 Thread Qualys Security Advisory
appearance of such issues? Maybe someone from CodeQL or GitHub Security Lab could chime in or help with this? Again, just thinking out loud. Thank you very much! With best regards, -- the Qualys Security Advisory team

Re: [oss-security] MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client

2025-02-21 Thread Qualys Security Advisory
-- the Qualys Security Advisory team

[oss-security] Local information disclosure in apport and systemd-coredump

2025-05-29 Thread Qualys Security Advisory
Qualys Security Advisory Local information disclosure in apport and systemd-coredump (CVE-2025-5054 and CVE-2025-4598) Contents Summary Mitigation

[oss-security] CVE-2025-6019: LPE from allow_active to root in libblockdev via udisks

2025-06-17 Thread Qualys Security Advisory
Qualys Security Advisory CVE-2025-6018: LPE from unprivileged to allow_active in *SUSE 15's PAM CVE-2025-6019: LPE from allow_active to root in libblockdev via udisks Con

[oss-security] Re: CVE-2025-6019: LPE from allow_active to root in libblockdev via udisks

2025-06-17 Thread Qualys Security Advisory
Hi all, Attached to this email are the two libblockdev/udisks patches that we sent to the linux-distros@openwall last week. Thank you very much! We are at your disposal for questions, comments, and further discussions. With best regards, -- the Qualys Security Advisory team From