Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 22 Jul 2015 22:55:09 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: Linux x86_64 NMI security issues

On 07/22/2015 07:30 PM, Solar Designer wrote:
> Andy et al.,
> 
> First of all, thank you for your hard work on these issues!
> 
> On Wed, Jul 22, 2015 at 11:12:00AM -0700, Andy Lutomirski wrote:
>> +++++ CVE-2015-3291 +++++
>> +++++ CVE-2015-5157 +++++
>> +++++ NMI bug, no CVE assigned +++++
>> +++++ CVE-2015-3290 +++++
> 
> Red Hat folks, and Petr in particular - please post to this thread when
> you have statements on which RHEL kernels are affected by which of these
> issues.  RHEL kernels are upstream for several other distros/projects.

That information usually ends up in our Bugzilla, e.g.:

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-3291

No statements have been added yet, but they should be at some point not
to long.

-- 
Kurt Seifried -- Red Hat -- Product Security -- Cloud
PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
Red Hat Product Security contact: secalert@...hat.com


Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.