|
Message-Id: <20150625094726.A8DDB6C0636@smtpvmsrv1.mitre.org> Date: Thu, 25 Jun 2015 05:47:26 -0400 (EDT) From: cve-assign@...re.org To: pmatouse@...hat.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request -- Linux kernel - kvm: x86: out-of-bounds memory access in pit_ioport_read function -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > Linux kernel versions before > http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee73f656 > had the same problem as QEMU/CVE-2015-3214. CVE-2015-3214 is also the correct CVE ID for this vulnerability in the Linux kernel. pit_ioport_read in the Linux kernel and pit_ioport_read in QEMU are not independent implementations. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJVi83GAAoJEKllVAevmvmsu0gH/RkNZNkywsxWGKNgwIc+RzUd E8qLDvzPidUJVOv6Jzf/thcNT8r4djrzra6ntiKhlxZVdVU0k5bGQr8FSWZ/OphB 2bDOM4PTrR1DXNPDFfyMCRNWT3Q22FlYbk6LZL45+Mhh+hPpybCUQ0xpznNSJ6e0 ec+RXB9I1RLZ10+d4cMRIv9z1wyvYD/bDXhs7WktAn3IrgRsiXeiao8QUh7zG9h1 Pw6vqWeTnbzX5Tmoawe84Wruk6y+3Yoi5UuYHASFI9WqH2EOxXdy9gdrRBKBE87t OcIhBoMLGH6jpfabyvQTpnwSajy8Eaqxk5waAUbFuX6dYZ35cK2qbQ1us4WjhMo= =H7PK -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.