Package: src:kfreebsd-10 Version: 10.1~svn274115-4+kbsd8u3 Severity: grave Tags: security
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:18.atkbd.asc Incorrect signedness comparison in the ioctl(2) handler allows a malicious local user to overwrite a portion of the kernel memory. This affects 10.1 in sid and jessie; 9.0 in wheezy; 10.3 and 11.1 in experimental. -- System Information: Debian Release: stretch/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: kfreebsd-amd64 (x86_64) Kernel: kFreeBSD 10.1-0-amd64 Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init)