Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2026-45251— Kernel use-after-free via file descriptor syscalls

AI Predicted 7.8 Difficulty: Moderate
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-45251

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Kernel use-after-free via file descriptor syscalls
Source: NVD (National Vulnerability Database)
Vulnerability Description
A file descriptor can be closed while a thread is blocked in a poll(2) or select(2) call waiting for that descriptor. Because the blocked thread does not hold a reference to the underlying object, this closure may result in the object being freed while the thread remains blocked. In this situation, the kernel must remove the blocked thread from the per-object wait queue prior to freeing the object. In the case of some file descriptor types, the kernel failed to unlink blocked threads from the object before freeing it. When the blocked thread is subsequently woken, it accesses memory that has already been freed resulting in a use-after-free vulnerability. The use-after-free vulnerability may be triggered by an unprivileged local user and can be exploited to obtain superuser privileges.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
释放后使用
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
FreeBSDFreeBSD 15.0-RELEASE ~ p9 -

II. Public POCs for CVE-2026-45251

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-45251

登录查看更多情报信息。

Same Patch Batch · FreeBSD · 2026-05-21 · 7 CVEs total

CVE-2026-45254Incorrect libcap_net limitation list manipulation
CVE-2026-45255Remote code execution via installer Wi-Fi access point scans
CVE-2026-39461select(2) file descriptor set overflow causes stack overflow
CVE-2026-45253Missing validation in ptrace(PT_SC_REMOTE)
CVE-2026-45252Heap overflow in FUSE_LISTXATTR
CVE-2026-45250Stack buffer overflow via setcred(2)

IV. Related Vulnerabilities

V. Comments for CVE-2026-45251

No comments yet


Leave a comment