Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 25 Jun 2015 05:47:26 -0400 (EDT)
From: cve-assign@...re.org
To: pmatouse@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request -- Linux kernel - kvm: x86: out-of-bounds memory access in pit_ioport_read function

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Linux kernel versions before
> http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee73f656
> had the same problem as QEMU/CVE-2015-3214.

CVE-2015-3214 is also the correct CVE ID for this vulnerability in the
Linux kernel. pit_ioport_read in the Linux kernel and pit_ioport_read
in QEMU are not independent implementations.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVi83GAAoJEKllVAevmvmsu0gH/RkNZNkywsxWGKNgwIc+RzUd
E8qLDvzPidUJVOv6Jzf/thcNT8r4djrzra6ntiKhlxZVdVU0k5bGQr8FSWZ/OphB
2bDOM4PTrR1DXNPDFfyMCRNWT3Q22FlYbk6LZL45+Mhh+hPpybCUQ0xpznNSJ6e0
ec+RXB9I1RLZ10+d4cMRIv9z1wyvYD/bDXhs7WktAn3IrgRsiXeiao8QUh7zG9h1
Pw6vqWeTnbzX5Tmoawe84Wruk6y+3Yoi5UuYHASFI9WqH2EOxXdy9gdrRBKBE87t
OcIhBoMLGH6jpfabyvQTpnwSajy8Eaqxk5waAUbFuX6dYZ35cK2qbQ1us4WjhMo=
=H7PK
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.