FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

FreeBSD -- Remote code execution via RPCSEC_GSS packet validation

Affected packages
15.0 <= FreeBSD-kernel < 15.0_5
14.4 <= FreeBSD-kernel < 14.4_1
14.3 <= FreeBSD-kernel < 14.3_10
13.5 <= FreeBSD-kernel < 13.5_11

Details

VuXML ID 733febba-28d2-11f1-b35e-bc241121aa0a
Discovery 2026-03-25
Entry 2026-03-26

Problem Description:

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first.

Impact:

As kgssapi.ko's RPCSEC_GSS implementation is vulnerable, remote code execution in the kernel is possible by an authenticated user that is able to send packets to the kernel's NFS server while kgssapi.ko is loaded into the kernel.

In userspace, applications which have librpcgss_sec loaded and run an RPC server are vulnerable to remote code execution from any client able to send it packets. We are not aware of any such applications in the FreeBSD base system.

References

CVE Name CVE-2026-4747
FreeBSD Advisory SA-26:08.rpcsec_gss