Automated analysis has detected that the following third party packages have had vulnerabilities publicly reported.
NOTE: There may be several bugs listed below - in almost all cases, all bugs can be quickly addressed by upgrading to the latest version of the package.
Package Name: sys-kernel/chromeos-kernel-3_8
Package Version: [cpe:/o:linux:linux_kernel:3.8.11]
Advisory: CVE-2016-5342
Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-5342
CVSS severity score: 10/10.0
Confidence: high
Description:
Heap-based buffer overflow in the wcnss_wlan_write function in drivers/net/wireless/wcnss/wcnss_wlan.c in the wcnss_wlan device driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service or possibly have unspecified other impact by writing to /dev/wcnss_wlan with an unexpected amount of data.
Advisory: CVE-2016-5344
Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-5344
CVSS severity score: 10/10.0
Confidence: high
Description:
Multiple integer overflows in the MDSS driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allow attackers to cause a denial of service or possibly have unspecified other impact via a large size value, related to mdss_compat_utils.c, mdss_fb.c, and mdss_rotator.c.
Comment 1 by vakh@chromium.org
, Sep 2 2016Labels: Security_Severity-High Security_Impact-Head
Status: Available (was: Untriaged)