CVE-2026-39461
Severity CVSS v4.0:
Pending analysis
Type:
CWE-121
Stack-based Buffer Overflow
Publication date:
21/05/2026
Last modified:
21/05/2026
Description
libcasper(3) communicates with helper processes via UNIX domain sockets, and uses the select(2) system call to wait for data to become available. However, it does not verify that its socket descriptor fits within select(2)&#39;s descriptor set size limit of FD_SETSIZE (1024).<br />
<br />
An attacker able to cause an application using libcasper(3) to allocate large file descriptors, e.g., by opening many descriptors and executing a program which is not careful to close them upon startup, may trigger stack corruption. If the target application runs with setuid root privileges, this could be used to escalate local privileges.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:freebsd:freebsd:14.3:-:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:14.3:p1:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:14.3:p10:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:14.3:p11:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:14.3:p12:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:14.3:p13:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:14.3:p2:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:14.3:p3:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:14.3:p4:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:14.3:p5:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:14.3:p6:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:14.3:p7:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:14.3:p8:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:14.3:p9:*:*:*:*:*:* | ||
| cpe:2.3:o:freebsd:freebsd:14.4:-:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



