CVE-2016-1880

The Linux compatibility layer in the kernel in FreeBSD 9.3, 10.1, and 10.2 allows local users to read portions of kernel memory and potentially gain privilege via unspecified vectors, related to "handling of Linux futex robust lists."
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:freebsd:freebsd:9.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:10.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:10.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:47

Type Values Removed Values Added
References () http://www.securitytracker.com/id/1034675 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1034675 - Third Party Advisory, VDB Entry
References () https://www.freebsd.org/security/advisories/FreeBSD-SA-16:03.linux.asc - Vendor Advisory () https://www.freebsd.org/security/advisories/FreeBSD-SA-16:03.linux.asc - Vendor Advisory

Information

Published : 2017-02-15 15:59

Updated : 2024-11-21 02:47


NVD link : CVE-2016-1880

Mitre link : CVE-2016-1880

CVE.ORG link : CVE-2016-1880


JSON object : View

Products Affected

freebsd

  • freebsd
CWE
CWE-264

Permissions, Privileges, and Access Controls