Automated analysis has detected that the following third party packages have had vulnerabilities publicly reported.
NOTE: There may be several bugs listed below - in almost all cases, all bugs can be quickly addressed by upgrading to the latest version of the package.
Package Name: sys-kernel/chromeos-kernel-3_10
Package Version: [cpe:/o:linux:linux_kernel:3.10.18]
Advisory: CVE-2015-0572
Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2015-0572
CVSS severity score: 7.5/10.0
Confidence: high
Description:
Multiple race conditions in drivers/char/adsprpc.c and drivers/char/adsprpc_compat.c in the ADSPRPC driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allow attackers to cause a denial of service (zero-value write) or possibly have unspecified other impact via a COMPAT_FASTRPC_IOCTL_INVOKE_FD ioctl call.
Advisory: CVE-2016-5343
Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-5343
CVSS severity score: 7.5/10.0
Confidence: high
Description:
drivers/soc/qcom/qdsp6v2/voice_svc.c in the QDSP6v2 Voice Service driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write request, as demonstrated by a voice_svc_send_req buffer overflow.
Comment 1 by mnissler@chromium.org
, Oct 13 2016Labels: -Restrict-View-SecurityTeam
Status: WontFix (was: Untriaged)