7.8

CVE-2026-39457

Stack overflow via select() file descriptor set overflow

When exchanging data over a socket, libnv uses select(2) to wait for data to arrive.  However, it does not verify whether the provided socket descriptor fits in select(2)'s file descriptor set size limit of FD_SETSIZE (1024).

An attacker who is able to force a libnv application to allocate large file descriptors, e.g., by opening many descriptors and executing a program which is not careful to close them upon startup, can trigger stack corruption.  If the target application is setuid-root, then this could be used to elevate local privileges.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
FreebsdFreebsd Version13.5 Update-
FreebsdFreebsd Version13.5 Updatebeta3
FreebsdFreebsd Version13.5 Updatep1
FreebsdFreebsd Version13.5 Updatep10
FreebsdFreebsd Version13.5 Updatep11
FreebsdFreebsd Version13.5 Updatep12
FreebsdFreebsd Version13.5 Updatep2
FreebsdFreebsd Version13.5 Updatep3
FreebsdFreebsd Version13.5 Updatep4
FreebsdFreebsd Version13.5 Updatep5
FreebsdFreebsd Version13.5 Updatep6
FreebsdFreebsd Version13.5 Updatep7
FreebsdFreebsd Version13.5 Updatep8
FreebsdFreebsd Version13.5 Updatep9
FreebsdFreebsd Version14.3 Update-
FreebsdFreebsd Version14.3 Updatep1
FreebsdFreebsd Version14.3 Updatep10
FreebsdFreebsd Version14.3 Updatep11
FreebsdFreebsd Version14.3 Updatep2
FreebsdFreebsd Version14.3 Updatep3
FreebsdFreebsd Version14.3 Updatep4
FreebsdFreebsd Version14.3 Updatep5
FreebsdFreebsd Version14.3 Updatep6
FreebsdFreebsd Version14.3 Updatep7
FreebsdFreebsd Version14.3 Updatep8
FreebsdFreebsd Version14.3 Updatep9
FreebsdFreebsd Version14.4 Update-
FreebsdFreebsd Version14.4 Updatep1
FreebsdFreebsd Version14.4 Updatep2
FreebsdFreebsd Version14.4 Updaterc1
FreebsdFreebsd Version15.0 Update-
FreebsdFreebsd Version15.0 Updatep1
FreebsdFreebsd Version15.0 Updatep2
FreebsdFreebsd Version15.0 Updatep3
FreebsdFreebsd Version15.0 Updatep4
FreebsdFreebsd Version15.0 Updatep5
FreebsdFreebsd Version15.0 Updatep6
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.057
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
134c704f-9b21-4f2e-91b3-4a467353bcc0 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-121 Stack-based Buffer Overflow

A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).