Integer signedness error in the genkbd_commonioctl function in sys/dev/kbd/kbd.c in FreeBSD 9.3 before p42, 10.1 before p34, 10.2 before p17, and 10.3 before p3 allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory overwrite and kernel crash), or gain privileges via a negative value in the flen structure member in the arg argument in a SETFKEY ioctl call, which triggers a "two way heap and stack overflow."
Advisories
Source ID Title
EUVD EUVD EUVD-2016-2980 Integer signedness error in the genkbd_commonioctl function in sys/dev/kbd/kbd.c in FreeBSD 9.3 before p42, 10.1 before p34, 10.2 before p17, and 10.3 before p3 allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory overwrite and kernel crash), or gain privileges via a negative value in the flen structure member in the arg argument in a SETFKEY ioctl call, which triggers a "two way heap and stack overflow."
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T23:10:40.320Z

Reserved: 2016-01-13T00:00:00

Link: CVE-2016-1886

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-05-25T15:59:02.677

Modified: 2025-04-12T10:46:40.837

Link: CVE-2016-1886

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses