Home

Description

Incorrect packet validation allowed unbounded recursion parsing SCTP chunk parameters. This can eventually result in a stack overflow and panic. Remote attackers can craft packets which cause affected systems to panic. This affects any system where pf is configured to process traffic, independent of the configured ruleset.

PUBLISHED Reserved 2026-04-27 | Published 2026-04-30 | Updated 2026-04-30 | Assigner freebsd

Problem types

CWE-674: Uncontrolled Recursion

CWE-791: Incomplete Filtering of Special Elements

Product status

Default status
unknown

15.0-RELEASE (release) before p7
affected

14.4-RELEASE (release) before p3
affected

14.3-RELEASE (release) before p12
affected

13.5-RELEASE (release) before p13
affected

Credits

Igor Gabriel Sousa e Souza finder

References

security.freebsd.org/advisories/FreeBSD-SA-26:14.pf.asc vendor-advisory

cve.org (CVE-2026-7164)

nvd.nist.gov (CVE-2026-7164)

Download JSON