Date: Wed, 22 Jul 2015 22:55:09 -0600 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com Subject: Re: Linux x86_64 NMI security issues On 07/22/2015 07:30 PM, Solar Designer wrote: > Andy et al., > > First of all, thank you for your hard work on these issues! > > On Wed, Jul 22, 2015 at 11:12:00AM -0700, Andy Lutomirski wrote: >> +++++ CVE-2015-3291 +++++ >> +++++ CVE-2015-5157 +++++ >> +++++ NMI bug, no CVE assigned +++++ >> +++++ CVE-2015-3290 +++++ > > Red Hat folks, and Petr in particular - please post to this thread when > you have statements on which RHEL kernels are affected by which of these > issues. RHEL kernels are upstream for several other distros/projects. That information usually ends up in our Bugzilla, e.g.: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-3291 No statements have been added yet, but they should be at some point not to long. -- Kurt Seifried -- Red Hat -- Product Security -- Cloud PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 Red Hat Product Security contact: secalert@...hat.com [ CONTENT OF TYPE application/pgp-signature SKIPPED ]
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ