CVE-2024-25940

`bhyveload -h <host-path>` may be used to grant loader access to the <host-path> directory tree on the host. Affected versions of bhyveload(8) do not make any attempt to restrict loader's access to <host-path>, allowing the loader to read any file the host user has access to. In the bhyveload(8) model, the host supplies a userboot.so to boot with, but the loader scripts generally come from the guest image. A maliciously crafted script could be used to exfiltrate sensitive data from the host accessible to the user running bhyhveload(8), which is often the system root.
Configurations

No configuration.

History

21 Nov 2024, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.3
References () https://security.freebsd.org/advisories/FreeBSD-SA-24:01.bhyveload.asc - () https://security.freebsd.org/advisories/FreeBSD-SA-24:01.bhyveload.asc -
References () https://security.netapp.com/advisory/ntap-20240419-0004/ - () https://security.netapp.com/advisory/ntap-20240419-0004/ -
CWE CWE-922

19 Apr 2024, 07:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240419-0004/ -

15 Feb 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-15 05:15

Updated : 2024-11-21 17:15


NVD link : CVE-2024-25940

Mitre link : CVE-2024-25940

CVE.ORG link : CVE-2024-25940


JSON object : View

Products Affected

No product.

CWE
CWE-922

Insecure Storage of Sensitive Information