- Description
- The rtsock_msg_buffer() function serializes routing information into a buffer. As a part of this, it copies sockaddr structures into a sockaddr_storage structure on the stack. It assumes that the source sockaddr length field had already been validated, but this is not necessarily the case, and it's possible for a malicious userspace program to craft a request which triggers a 127-byte overflow. In practice, this overflow immediately overwrites the canary for the rtsock_msg_buffer() stack frame, resulting in a panic once the function returns. The bug allows an unprivileged user to crash the kernel by triggering a stack buffer overflow in rtsock_msg_buffer(). In particular, the overflow will corrupt a stack canary value that is verified when the function returns; this mitigates the impact of the stack overflow by triggering a kernel panic. Other kernel bugs may exist which allow userspace to find the canary value and thus defeat the mitigation, at which point local privilege escalation may be possible.
- Source
- secteam@freebsd.org
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
- secteam@freebsd.org
- CWE-787
- Hype score
- Not currently trending
FreeBSDにJail (chroot)エスケープが可能な脆弱性。CVE-2025-15576は親子関係にない2つのJailがnullfsマウント経由で共有のディレクトリにアクセス可能な場合に、Jailのroot外のファイルディスクリプタを取得可能なもの
@__kokumoto
26 Feb 2026
717 Impressions
1 Retweet
5 Likes
1 Bookmark
0 Replies
0 Quotes
FreeBSD patches a critical jail escape (CVE-2025-15576) and a kernel heap overflow (CVE-2026-3038). Learn how nullfs and routing sockets put hosts at risk. #FreeBSD #CyberSecurity #JailEscape #InfoSec #KernelSecurity #Vulnerability #SysAdmin #OpenSource https://t.co/vLTgtaQw1t
@the_yellow_fall
26 Feb 2026
250 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes