PT-2026-28219 · Unknown+1 · Kgssapi.Ko+2
Nicholas Carlini
·
Published
2026-03-26
·
Updated
2026-04-02
·
CVE-2026-4747
CVSS v3.1
8.8
High
| AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
FreeBSD versions prior to patchday March 26, 2026
Description
The vulnerability is a stack buffer overflow in the
kgssapi.ko kernel module, specifically within the svc rpc function. This flaw allows for remote code execution in the kernel, potentially granting a root shell on affected systems. The issue arises from a failure to ensure sufficient buffer size when copying data from RPCSEC GSS packets. A malicious client can trigger this overflow without authentication. The vulnerability was discovered and exploited by an AI model (Claude) within a short timeframe, demonstrating a significant reduction in the time between vulnerability disclosure and weaponization. The fix involves adding a bounds check to the vulnerable buffer.Recommendations
Update to a version with the fix included in the March 26, 2026 patchday.
Exploit
Fix
RCE
Stack Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Freebsd
Kgssapi.Ko
Librpcgss Sec