CVE-2026-45254
EUVD-2026-3126421.05.2026, 10:16
In the case of the cap_net service, when a key present in the old limit was omitted from the new limit, the missing key was treated as "allow any" instead of being rejected. In certain scenarios, an application that had previously restricted a subset of network operations could ask for a new limit that extended the permissions of the process.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| freebsd | freebsd | 14.3 |
| freebsd | freebsd | 14.3:p1 |
| freebsd | freebsd | 14.3:p10 |
| freebsd | freebsd | 14.3:p11 |
| freebsd | freebsd | 14.3:p12 |
| freebsd | freebsd | 14.3:p13 |
| freebsd | freebsd | 14.3:p2 |
| freebsd | freebsd | 14.3:p3 |
| freebsd | freebsd | 14.3:p4 |
| freebsd | freebsd | 14.3:p5 |
| freebsd | freebsd | 14.3:p6 |
| freebsd | freebsd | 14.3:p7 |
| freebsd | freebsd | 14.3:p8 |
| freebsd | freebsd | 14.3:p9 |
| freebsd | freebsd | 14.4 |
| freebsd | freebsd | 14.4:p1 |
| freebsd | freebsd | 14.4:p2 |
| freebsd | freebsd | 14.4:p3 |
| freebsd | freebsd | 14.4:p4 |
| freebsd | freebsd | 14.4:rc1 |
| freebsd | freebsd | 15.0 |
| freebsd | freebsd | 15.0:p1 |
| freebsd | freebsd | 15.0:p2 |
| freebsd | freebsd | 15.0:p3 |
| freebsd | freebsd | 15.0:p4 |
| freebsd | freebsd | 15.0:p5 |
| freebsd | freebsd | 15.0:p6 |
| freebsd | freebsd | 15.0:p7 |
| freebsd | freebsd | 15.0:p8 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
Vulnerability Media Exposure