Stack Buffer Overflow Vulnerability in FreeBSD Routing Components
CVE-2026-3038

7.5HIGH

Key Information:

Vendor

FreeBSD

Status
Vendor
CVE Published:
9 March 2026

What is CVE-2026-3038?

A vulnerability exists within the FreeBSD routing components caused by improper serialization of socket address structures. The rtsock_msg_buffer() function does not adequately validate the length of the source sockaddr, leading to a potential 127-byte stack buffer overflow. With a crafted request, an unprivileged user may trigger this overflow, which overwrites a critical stack canary value. This results in a kernel panic upon return from the affected function. Although the kernel attempts to mitigate risks associated with this vulnerability, potential exploits may arise if an attacker discovers the canary value through other kernel vulnerabilities, potentially allowing local privilege escalation.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

FreeBSD 15.0-RELEASE

FreeBSD 14.3-RELEASE

FreeBSD 13.5-RELEASE

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Adam Crosser of the Praetorian Labs team
.