Description
A logic bug in the code which disables kernel tracing for setuid programs meant that tracing was not disabled when it should have, allowing unprivileged users to trace and inspect the behavior of setuid programs. The bug may be used by an unprivileged user to read the contents of files to which they would not otherwise have access, such as the local password database.
INFO
Published Date :
2024-08-11T02:40:03.814Z
Last Modified :
2024-10-29T19:41:19.862Z
Source :
freebsd
AFFECTED PRODUCTS
The following products are affected by CVE-2024-6760 vulnerability.
| Vendors | Products |
|---|---|
| Freebsd |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2024-6760.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact