CVE-2024-6760

A logic bug in the code which disables kernel tracing for setuid programs meant that tracing was not disabled when it should have, allowing unprivileged users to trace and inspect the behavior of setuid programs.

The bug may be used by an unprivileged user to read the contents of files to which they would not otherwise have access, such as the local password database.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
freebsdCNA
---
---
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 37%
VendorProductVersion
freebsdfreebsd
𝑥
< 13.0
freebsdfreebsd
13.1 ≤
𝑥
< 13.3
freebsdfreebsd
13.3:p1
freebsdfreebsd
13.3:p2
freebsdfreebsd
13.3:p3
freebsdfreebsd
13.3:p4
freebsdfreebsd
14.0:beta5
freebsdfreebsd
14.0:p1
freebsdfreebsd
14.0:p2
freebsdfreebsd
14.0:p3
freebsdfreebsd
14.0:p4
freebsdfreebsd
14.0:p5
freebsdfreebsd
14.0:p6
freebsdfreebsd
14.0:p7
freebsdfreebsd
14.0:p8
freebsdfreebsd
14.0:rc3
freebsdfreebsd
14.0:rc4-p1
freebsdfreebsd
14.1:p1
freebsdfreebsd
14.1:p2
𝑥
= Vulnerable software versions