When processing the header of an incoming message, libnv failed to properly validate the message size.

The lack of validation allows a malicious program to write outside the bounds of a heap allocation. This can trigger a crash or system panic, and it may be possible for an unprivileged user to exploit the bug to elevate their privileges.

Project Subscriptions

Vendors Products
Freebsd Subscribe
Freebsd Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 30 Apr 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Freebsd
Freebsd freebsd
Vendors & Products Freebsd
Freebsd freebsd

Thu, 30 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
Description When processing the header of an incoming message, libnv failed to properly validate the message size. The lack of validation allows a malicious program to write outside the bounds of a heap allocation. This can trigger a crash or system panic, and it may be possible for an unprivileged user to exploit the bug to elevate their privileges.
Title Heap overflow in libnv
Weaknesses CWE-122
CWE-130
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: freebsd

Published:

Updated: 2026-04-30T08:08:13.461Z

Reserved: 2026-04-28T15:08:10.642Z

Link: CVE-2026-35547

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-30T09:16:03.167

Modified: 2026-04-30T09:16:03.167

Link: CVE-2026-35547

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T10:30:34Z

Weaknesses