CVE-2026-35547
Severity CVSS v4.0:
Pending analysis
Type:
CWE-122
Heap-based Buffer Overflow
Publication date:
30/04/2026
Last modified:
01/05/2026
Description
When processing the header of an incoming message, libnv failed to properly validate the message size.<br />
<br />
The lack of validation allows a malicious program to write outside the bounds of a heap allocation. This can trigger a crash or system panic, and it may be possible for an unprivileged user to exploit the bug to elevate their privileges.
Impact
Base Score 3.x
8.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:freebsd:freebsd:13.5:-:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.5:beta3:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.5:p1:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.5:p10:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.5:p11:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.5:p12:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.5:p2:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.5:p3:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.5:p4:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.5:p5:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.5:p6:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.5:p7:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.5:p8:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:13.5:p9:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:14.3:-:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



