|
Message-Id: <20150625104241.D22D76C063C@smtpvmsrv1.mitre.org> Date: Thu, 25 Jun 2015 06:42:41 -0400 (EDT) From: cve-assign@...re.org To: pmatouse@...hat.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request -- Linux kernel - kvm: x86: out-of-bounds memory access in pit_ioport_read function -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > Doesn't this fall under different code base? No. There would be separate CVE IDs if it were a conceptually identical vulnerability in different code found in different codebases. We do not assign multiple CVE IDs to the same vulnerability in the same piece of code, regardless of how or why that code has been copied into different projects. This is a case with reuse of an entire substantial function: the function name is the same, the code structure is the same, names of variables and structure members are largely the same, etc. The reuse extends to pit_ioport_write as well. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJVi9qMAAoJEKllVAevmvmsNHcIAKMyN14lL05mYXYPwReV8H7q Y9zAOEmowL7/x+vREAFOivCnqMa3QZdA+tx6lKwVJxh72fPUu+n21Rnb7mQSpkaD 653JOtRHu6hHT36JU8XspnzdSzOSFOiPb30IaIFhKG32zoKPbCw66wb+KQ09xGWR 7s4PTlOt04oFDGzH6J2EFDg3Qn43JRP+/ROuEpr0t64TIxPNKghSex+PUkvzFG4I u2F5x1eTaJ/X0GjePRVlq/oM1sCNrxSYnDd5WQabcme/it+yWrYP1QRM1Z4+b97O uYvM016P4Q/kN3scEaJB8mzhGNJSM7ZpAjI/gsuOobWyAbgk6zF6l58SBQnjn5I= =0Eos -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.