Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 25 Jun 2015 06:42:41 -0400 (EDT)
From: cve-assign@...re.org
To: pmatouse@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request -- Linux kernel - kvm: x86: out-of-bounds memory access in pit_ioport_read function

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Doesn't this fall under different code base?

No. There would be separate CVE IDs if it were a conceptually
identical vulnerability in different code found in different
codebases. We do not assign multiple CVE IDs to the same vulnerability
in the same piece of code, regardless of how or why that code has been
copied into different projects. This is a case with reuse of an entire
substantial function: the function name is the same, the code
structure is the same, names of variables and structure members are
largely the same, etc. The reuse extends to pit_ioport_write as well.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVi9qMAAoJEKllVAevmvmsNHcIAKMyN14lL05mYXYPwReV8H7q
Y9zAOEmowL7/x+vREAFOivCnqMa3QZdA+tx6lKwVJxh72fPUu+n21Rnb7mQSpkaD
653JOtRHu6hHT36JU8XspnzdSzOSFOiPb30IaIFhKG32zoKPbCw66wb+KQ09xGWR
7s4PTlOt04oFDGzH6J2EFDg3Qn43JRP+/ROuEpr0t64TIxPNKghSex+PUkvzFG4I
u2F5x1eTaJ/X0GjePRVlq/oM1sCNrxSYnDd5WQabcme/it+yWrYP1QRM1Z4+b97O
uYvM016P4Q/kN3scEaJB8mzhGNJSM7ZpAjI/gsuOobWyAbgk6zF6l58SBQnjn5I=
=0Eos
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ