SB2026033033 - Multiple vulnerabilities in FreeBSD
Published: March 30, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Improper resource shutdown or release (CVE-ID: CVE-2026-4247)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to improper memory management in the TCP stack when handling unexpected TCP segments that meet challenge ACK criteria. A remote attacker can send a specially crafted sequence of TCP packets to exceed the rate limit for challenge ACKs and trigger an mbuf leak, leading to resource exhaustion.
Off-path attackers may also exploit this issue by spoofing packets with guessed connection parameters, though this is more difficult.
2) NULL pointer dereference (CVE-ID: CVE-2026-4652)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to a null pointer dereference in the nvmf driver when handling CONNECT commands for I/O queues with a bogus or stale CNTLID. A remote attacker can send a specially crafted CONNECT command to cause a kernel panic.
3) Stack-based buffer overflow (CVE-ID: CVE-2026-4747)
The vulnerability allows a remote attacker to execute arbitrary code in the kernel or in userspace RPC servers.
The vulnerability exists due to improper input validation in the RPCSEC_GSS packet validation routine when handling RPC packets. A remote attacker can send a specially crafted RPC packet to trigger a stack overflow, leading to arbitrary code execution.
The kernel component kgssapi.ko is vulnerable when loaded, and userspace applications linked with librpcsec_gss that run an RPC server are also vulnerable.
4) Input validation error (CVE-ID: CVE-2026-4748)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to an error in pf packet filter implementation when handling rules containing the address range syntax (x.x.x.x - y.y.y.y) that only differ in the address ranges. A remote attacker can bypass previously configured rules and gain unauthorized access to the system bypassing packet filtering.
Remediation
Install update from vendor's website.