CVE-2026-45251
Use-After-Free in FreeBSD Kernel Due to Poll/Select Race Condition
Publication date: 2026-05-21
Last updated on: 2026-05-21
Assigner: FreeBSD
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| freebsd | freebsd | From 14 (inc) to 15 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-416 | The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-45251 is a use-after-free vulnerability in the FreeBSD kernel. It happens when a file descriptor is closed while a thread is blocked in a poll(2) or select(2) system call waiting for that descriptor. The kernel fails to properly remove the blocked thread from the wait queue before freeing the underlying object. As a result, when the thread is later woken, it accesses memory that has already been freed, causing a use-after-free condition.
How can this vulnerability impact me? :
This vulnerability can be exploited by an unprivileged local user to gain superuser privileges. This means an attacker with local access could escalate their privileges to root, potentially taking full control of the affected system.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, users should upgrade their FreeBSD systems to the patched versions provided by the FreeBSD Security Team.
- Use pkg(8) to update installed packages.
- Use freebsd-update(8) to apply binary updates.
- Alternatively, apply the source code patches released for stable/15, stable/14, and their respective release branches.
After applying updates or patches, a system reboot is required to ensure the fixes take effect.
No workaround is available for this vulnerability.