CVE-2026-39457
Stack overflow via select() file descriptor set overflow
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
When exchanging data over a socket, libnv uses select(2) to wait for data to arrive. However, it does not verify whether the provided socket descriptor fits in select(2)'s file descriptor set size limit of FD_SETSIZE (1024). An attacker who is able to force a libnv application to allocate large file descriptors, e.g., by opening many descriptors and executing a program which is not careful to close them upon startup, can trigger stack corruption. If the target application is setuid-root, then this could be used to elevate local privileges.
| CWE | CWE-121 |
| Vendor | freebsd |
| Product | freebsd |
| Published | Apr 30, 2026 |
Stay Ahead of the Next One
Get instant alerts for freebsd freebsd
Be the first to know when new unknown vulnerabilities affecting freebsd freebsd are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
FreeBSD / FreeBSD
15.0-RELEASE < p7 14.4-RELEASE < p3 14.3-RELEASE < p12 13.5-RELEASE < p13
References
Credits
Joshua Rogers of AISLE Research Team