Summary: | sys-kernel/gentoo-sources: denial of service (host OS crash) or possibly gain privileges via crafted ioctl calls | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Christopher Díaz Riveros (RETIRED) <chrisadr> |
Component: | Kernel | Assignee: | Gentoo Kernel Security <security-kernel> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | kernel |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://www.cvedetails.com/cve/CVE-2016-10150/ | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Christopher Díaz Riveros (RETIRED)
2017-07-12 19:13:54 UTC
This bug does not exist in any currently available gentoo-sources version. The fixed kernel was released 7 months ago, and the only stable branch that contained this bug was EOLed 6 months ago. It would be a good idea to clean the metadata from the package, I didn't know wich one of them still stable thanks (In reply to dwfreed from comment #1) > This bug does not exist in any currently available gentoo-sources version. > The fixed kernel was released 7 months ago, and the only stable branch that > contained this bug was EOLed 6 months ago. For posterity (it would be helpful if comments like these were specific to begin with); I take it by EOLed you mean upstream? Would you happen to have information in which versions of the various stable branches this is fixed in? and if we still have a branch stable that is EOLed we likely want to consider a package mask, or at least cleaning the versions from the gentoo repository. Fixed in 4.9 |