PT-2026-28219 · Freebsd+1 · Freebsd+2

Nicholas Carlini

·

Published

2026-03-26

·

Updated

2026-05-16

·

CVE-2026-4747

CVSS v2.0

9.0

High

VectorAV:N/AC:L/Au:S/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions FreeBSD (affected versions not specified)
Description A stack overflow exists in the RPCSEC GSS implementation within the kgssapi.ko kernel module and the librpcgss sec userspace library. The issue occurs during the validation of RPCSEC GSS data packets, where a routine checks a packet signature and copies a portion of the packet into a stack buffer without verifying if the buffer is sufficiently large. This flaw can be triggered by a malicious client and does not require prior authentication.
In the kernel, remote code execution is possible for an authenticated user capable of sending packets to the kernel's NFS server while kgssapi.ko is loaded. In userspace, any application that runs an RPC server and has librpcgss sec loaded is vulnerable to remote code execution from any client capable of sending packets.
Recommendations As a temporary workaround, restrict access to the kernel's NFS server or avoid loading the kgssapi.ko module to minimize the risk of kernel-level exploitation. Restrict the use of the librpcgss sec library in userspace RPC servers until a fix is applied. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

RCE

DoS

Stack Overflow

Weakness Enumeration

Related Identifiers

BDU:2026-04973
CVE-2026-4747

Affected Products

Freebsd
Kgssapi.Ko
Librpcgss Sec