Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 25 Jun 2015 05:47:26 -0400 (EDT)
From: cve-assign@...re.org
To: pmatouse@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request -- Linux kernel - kvm: x86: out-of-bounds memory access in pit_ioport_read function

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Linux kernel versions before
> http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee73f656
> had the same problem as QEMU/CVE-2015-3214.

CVE-2015-3214 is also the correct CVE ID for this vulnerability in the
Linux kernel. pit_ioport_read in the Linux kernel and pit_ioport_read
in QEMU are not independent implementations.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVi83GAAoJEKllVAevmvmsu0gH/RkNZNkywsxWGKNgwIc+RzUd
E8qLDvzPidUJVOv6Jzf/thcNT8r4djrzra6ntiKhlxZVdVU0k5bGQr8FSWZ/OphB
2bDOM4PTrR1DXNPDFfyMCRNWT3Q22FlYbk6LZL45+Mhh+hPpybCUQ0xpznNSJ6e0
ec+RXB9I1RLZ10+d4cMRIv9z1wyvYD/bDXhs7WktAn3IrgRsiXeiao8QUh7zG9h1
Pw6vqWeTnbzX5Tmoawe84Wruk6y+3Yoi5UuYHASFI9WqH2EOxXdy9gdrRBKBE87t
OcIhBoMLGH6jpfabyvQTpnwSajy8Eaqxk5waAUbFuX6dYZ35cK2qbQ1us4WjhMo=
=H7PK
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ