FreeBSD: Local Privilege Escalation via Execve()

· security · Source ↗

TLDR

  • FreeBSD-SA-26:13 patches a kernel operator-precedence bug in execve(2) letting unprivileged users gain root on all supported versions.

Key Takeaways

  • Root cause: operator precedence bug triggers a buffer overflow that overwrites adjacent execve(2) argument buffers with attacker-controlled data.
  • CVE-2026-7270 affects all supported FreeBSD branches: 13.x, 14.x, and 15.x; patches landed 2026-04-29.
  • No workaround exists; fix requires upgrading to a patched releng branch and rebooting.
  • Update paths: pkg upgrade on amd64/arm64 for base-package installs, freebsd-update for binary installs, or manual kernel patch and recompile.
  • Credited to Ryan of Calif.io; PGP-signed advisory and patches available at security.FreeBSD.org.

Hacker News Comment Review

  • The “no workaround available” clause drew immediate concern, as it means exposure cannot be mitigated without a full upgrade and reboot.
  • Commenters noted that not all FreeBSD operators can freebsd-update and reboot on demand, making this a real operational problem for production systems.

Notable Comments

  • @itsthefrank: highlights that “not everyone can just freebsd-update and reboot,” making patch deployment non-trivial for many operators.

Original | Discuss on HN