Home

Description

When processing the header of an incoming message, libnv failed to properly validate the message size. The lack of validation allows a malicious program to write outside the bounds of a heap allocation. This can trigger a crash or system panic, and it may be possible for an unprivileged user to exploit the bug to elevate their privileges.

PUBLISHED Reserved 2026-04-28 | Published 2026-04-30 | Updated 2026-05-01 | Assigner freebsd

Problem types

CWE-122: Heap-based Buffer Overflow

CWE-130: Improper Handling of Length Parameter Inconsistency

Product status

Default status
unknown

15.0-RELEASE (release) before p7
affected

14.4-RELEASE (release) before p3
affected

14.3-RELEASE (release) before p12
affected

13.5-RELEASE (release) before p13
affected

Credits

Mariusz Zaborski finder

References

security.freebsd.org/advisories/FreeBSD-SA-26:17.libnv.asc vendor-advisory

cve.org (CVE-2026-35547)

nvd.nist.gov (CVE-2026-35547)

Download JSON