CVE-2026-39461 PUBLISHED

select(2) file descriptor set overflow causes stack overflow

Assigner: freebsd
Reserved: 28.04.2026 Published: 21.05.2026 Updated: 21.05.2026

libcasper(3) communicates with helper processes via UNIX domain sockets, and uses the select(2) system call to wait for data to become available. However, it does not verify that its socket descriptor fits within select(2)'s descriptor set size limit of FD_SETSIZE (1024).

An attacker able to cause an application using libcasper(3) to allocate large file descriptors, e.g., by opening many descriptors and executing a program which is not careful to close them upon startup, may trigger stack corruption. If the target application runs with setuid root privileges, this could be used to escalate local privileges.

Product Status

Vendor FreeBSD
Product FreeBSD
Versions Default: unknown
  • affected from 15.0-RELEASE to p9 (excl.)
  • affected from 14.4-RELEASE to p5 (excl.)
  • affected from 14.3-RELEASE to p14 (excl.)

Credits

  • Joshua Rogers of AISLE Research Team finder

References

Problem Types

  • CWE-121: Stack-based Buffer Overflow CWE