Description

A logic bug in the code which disables kernel tracing for setuid programs meant that tracing was not disabled when it should have, allowing unprivileged users to trace and inspect the behavior of setuid programs. The bug may be used by an unprivileged user to read the contents of files to which they would not otherwise have access, such as the local password database.

INFO

Published Date :

2024-08-11T02:40:03.814Z

Last Modified :

2024-10-29T19:41:19.862Z

Source :

freebsd
AFFECTED PRODUCTS

The following products are affected by CVE-2024-6760 vulnerability.

Vendors Products
Freebsd
  • Freebsd
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-6760.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact