Qualys oss-security reports
Qualys writes excellent security reports and analysis. Their method and formatting is exemplary for anyone wishing to learn to write clear and concise security reports.
Here are all of Qualys’ Security advisories submitted to the oss-security mailing list, including “short write-ups” (e.g. 2022-01-10), and third-party analysis (2023-02-02) not listed on Qualys’ website.
The titles have been simplified to unify archive listing.
The email discussion and followup is worthwhile. In the future I may add mbox files (but need an archive).
Download a local copy of the txt files with:
wget -A txt -r --no-parent https://markesler.com/notes/qualys-oss-security-reports/
update 2024-11-19: I had the privilege of coordinating on behalf of Qualys for LPEs in needrestart. Their empathy and deftness were humbling.
Reports
- LPEs in needrestart [Q] [oss] [local]
- glibc-based linux sshd RCE [Q] [oss] [local]
- glibc qsort() OOB read and write [Q] [oss] [local]
- glibc syslog() heap overflow [Q] [oss] [local]
- glibc ld.so LPE [Q] [oss] [local]
- openssh forwarded ssh-agent RCE [Q] [oss] [local]
- renderdoc LPE and RCE [Q] [oss] [local]
- openbsd libskey stack overflow [NA] [oss] [local]
- openssh double-free analysis [NA] [oss] [local]
- snap-confine mkdir LPE race chains [Q] [oss] [local]
- multipathd symlink LPE [Q] [oss] [local]
- linux nft_object() UAF [NA] [oss] [local]
- snap-confine LPE race chain in mount [Q] [oss] [local]
- linux slab OOB write [NA] [oss] [local]
- polkit pkexec LPE [Q] [oss] [local]
- glibc memleak and buffer under/overflow [NA] [oss] [local]
- util-linux libmount SUIDs [NA] [oss] [local]
- systemd-tmpfiles recursion DoS [NA] [oss] [local]
- linux OOB FS write to LPE [Q] [oss] [local]
- systemd stack exhaustion DoS [Q] [oss] [local]
- exim vulnerabilities [Q] [oss] [local]
- sudo heap overflow [Q] [oss] [local]
- qmail RCE [Q] [oss] [local]
- opensmtpd local information leak [Q] [oss] [local]
- opensmtpd LPE and RCE [Q] [oss] [local]
- openbsd dynamic loader LPE [Q] [oss] [local]
- openbsd authentication vulnerabilities [Q] [oss] [local]
- exim RCE [Q] [oss] [local]
- systemd-journald exploit [Q] [oss] [local]
- linux create_elf_tables() int overflow [Q] [oss] [local]
- openssh another username enumeration [NA] [oss] [local]
- openssh username enumeration [NA] [oss] [local]
- procps-ng audit report [Q] [oss] [local]
- iscsiuio overflow [NA] [oss] [local]
- glibc ld.so buffer overflow [Q] [oss] [local]
- linux PIE/stack corruption [Q] [oss] [local]
- stack clash [Q] [oss] [local]
- sudo get_process_ttyname() LPE [Q] [oss] [local]
- openssh client info leak and heap overflow [Q] [oss] [local]
- libressl memory leak and buffer overflow [Q] [oss] [local]
- opensmtpd audit report [Q] [oss] [local]
- libuser DoS and LPE [Q] [oss] [local]
- glibc gethostbyname buffer overflow [Q] [oss] [local]