The lack of validation allows a malicious program to write outside the bounds of a heap allocation. This can trigger a crash or system panic, and it may be possible for an unprivileged user to exploit the bug to elevate their privileges.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 30 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 30 Apr 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Freebsd
Freebsd freebsd |
|
| Vendors & Products |
Freebsd
Freebsd freebsd |
Thu, 30 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When processing the header of an incoming message, libnv failed to properly validate the message size. The lack of validation allows a malicious program to write outside the bounds of a heap allocation. This can trigger a crash or system panic, and it may be possible for an unprivileged user to exploit the bug to elevate their privileges. | |
| Title | Heap overflow in libnv | |
| Weaknesses | CWE-122 CWE-130 |
|
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: freebsd
Published:
Updated: 2026-04-30T13:12:25.493Z
Reserved: 2026-04-28T15:08:10.642Z
Link: CVE-2026-35547
Updated: 2026-04-30T13:12:22.260Z
Status : Awaiting Analysis
Published: 2026-04-30T09:16:03.167
Modified: 2026-04-30T15:09:49.123
Link: CVE-2026-35547
No data.
OpenCVE Enrichment
Updated: 2026-04-30T10:30:34Z