🔐 CVE Alert

CVE-2025-24934

MEDIUM 5.4

SO_REUSEPORT_LB breaks connect(2) for UDP sockets

CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
9th

Software which sets SO_REUSEPORT_LB on a socket and then connects it to a host will not directly observe any problems. However, due to its membership in a load-balancing group, that socket will receive packets originating from any host. This breaks the contract of the connect(2) and implied connect via sendto(2), and may leave the application vulnerable to spoofing attacks. The kernel failed to check the connection state of sockets when adding them to load-balancing groups. Furthermore, when looking up the destination socket for an incoming packet, the kernel will match a socket belonging to a load-balancing group even if it is connected, in violation of the contract that connected sockets are only supposed to receive packets originating from the connected host.

CWE CWE-488
Vendor freebsd
Product freebsd
Published Oct 22, 2025
Last Updated Apr 23, 2026
Stay Ahead of the Next One

Get instant alerts for freebsd freebsd

Be the first to know when new medium vulnerabilities affecting freebsd freebsd are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

FreeBSD / FreeBSD
15.0-BETA2 < p1 14.3-RELEASE < p5 13.5-RELEASE < p6

References

NVD ↗ CVE.org ↗ EPSS Data ↗
security.freebsd.org: https://security.freebsd.org/advisories/FreeBSD-SA-25:09.netinet.asc usenix.org: https://www.usenix.org/system/files/conference/usenixsecurity26/sec26_prepub_ben-simhon.pdf

Credits

MSc. student Omer Ben Simhon from the Hebrew University School of Computer Science and Engineering Prof. Amit Klein from the Hebrew University School of Computer Science and Engineering