PatchSiren cyber security CVE debrief
CVE-2016-1881 Freebsd CVE debrief
CVE-2016-1881 describes a local vulnerability in the FreeBSD kernel’s Linux compatibility layer. A crafted setgroups system call can crash the system and may also enable privilege escalation. NVD lists affected FreeBSD releases as 9.3, 10.1, and 10.2, and assigns a high-severity CVSS v3.0 score of 7.8.
- Vendor
- Freebsd
- Product
- CVE-2016-1881
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-15
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-15
- Advisory updated
- 2026-05-13
Who should care
FreeBSD administrators and security teams should care, especially where untrusted local accounts, multi-user systems, or workloads using the Linux compatibility layer are present.
Technical summary
The NVD record describes a kernel issue in FreeBSD’s Linux compatibility layer involving the setgroups system call. The attack vector is local (AV:L) with low complexity and low privileges required, no user interaction, and potential high impact to confidentiality, integrity, and availability. The vulnerable CPE entries explicitly include FreeBSD 9.3, 10.1, and 10.2. The record’s primary weakness classification is CWE-264.
Defensive priority
High. Because the issue is locally exploitable and can affect kernel integrity and availability, it should be prioritized on systems where local access is possible or where FreeBSD versions 9.3/10.1/10.2 remain in use.
Recommended defensive actions
- Confirm whether any systems are running FreeBSD 9.3, 10.1, or 10.2.
- Apply the vendor guidance from the FreeBSD security advisory referenced in the CVE record.
- Restrict and monitor local account access on affected hosts until remediation is complete.
- Review whether the Linux compatibility layer is needed on exposed systems and reduce unnecessary exposure where operationally feasible.
- Use the NVD and FreeBSD advisory links to verify remediation status for your specific deployment.
Evidence notes
All statements are supported by the supplied CVE record and reference metadata: NVD describes a local kernel vulnerability in the Linux compatibility layer setgroups system call with crash and potential privilege impact; the CVSS vector is AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H; affected CPEs list FreeBSD 9.3, 10.1, and 10.2; and the record includes a FreeBSD vendor advisory plus Oracle and SecurityTracker references. The CVE was published on 2017-02-15 and later modified on 2026-05-13; those dates are disclosure/record timeline context, not exploit or patch dates.
Official resources
-
CVE-2016-1881 CVE record
CVE.org
-
CVE-2016-1881 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
The CVE record was published on 2017-02-15 and modified on 2026-05-13. The debrief uses the publication date as the disclosure timeline anchor.