Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 22 Jul 2015 22:55:09 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: Linux x86_64 NMI security issues

On 07/22/2015 07:30 PM, Solar Designer wrote:
> Andy et al.,
> 
> First of all, thank you for your hard work on these issues!
> 
> On Wed, Jul 22, 2015 at 11:12:00AM -0700, Andy Lutomirski wrote:
>> +++++ CVE-2015-3291 +++++
>> +++++ CVE-2015-5157 +++++
>> +++++ NMI bug, no CVE assigned +++++
>> +++++ CVE-2015-3290 +++++
> 
> Red Hat folks, and Petr in particular - please post to this thread when
> you have statements on which RHEL kernels are affected by which of these
> issues.  RHEL kernels are upstream for several other distros/projects.

That information usually ends up in our Bugzilla, e.g.:

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-3291

No statements have been added yet, but they should be at some point not
to long.

-- 
Kurt Seifried -- Red Hat -- Product Security -- Cloud
PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
Red Hat Product Security contact: secalert@...hat.com


Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ