`bhyveload -h <host-path>` may be used to grant loader access to the <host-path> directory tree on the host.  Affected versions of bhyveload(8) do not make any attempt to restrict loader's access to <host-path>, allowing the loader to read any file the host user has access to. In the bhyveload(8) model, the host supplies a userboot.so to boot with, but the loader scripts generally come from the guest image.  A maliciously crafted script could be used to exfiltrate sensitive data from the host accessible to the user running bhyhveload(8), which is often the system root.
                
            References
                    | Link | Resource | 
|---|---|
| https://security.freebsd.org/advisories/FreeBSD-SA-24:01.bhyveload.asc | Vendor Advisory | 
| https://security.netapp.com/advisory/ntap-20240419-0004/ | Third Party Advisory | 
| https://security.freebsd.org/advisories/FreeBSD-SA-24:01.bhyveload.asc | Vendor Advisory | 
| https://security.netapp.com/advisory/ntap-20240419-0004/ | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    04 Jun 2025, 21:24
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Freebsd Freebsd freebsd | |
| References | () https://security.freebsd.org/advisories/FreeBSD-SA-24:01.bhyveload.asc - Vendor Advisory | |
| References | () https://security.netapp.com/advisory/ntap-20240419-0004/ - Third Party Advisory | |
| CPE | cpe:2.3:o:freebsd:freebsd:13.2:p8:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p6:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p9:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:rc3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p7:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:rc4-p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:beta5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:p4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:p1:*:*:*:*:*:* | 
21 Nov 2024, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://security.freebsd.org/advisories/FreeBSD-SA-24:01.bhyveload.asc - | |
| References | () https://security.netapp.com/advisory/ntap-20240419-0004/ - | |
| CWE | CWE-922 | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 6.3 | 
19 Apr 2024, 07:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | |
| Summary | 
 | 
15 Feb 2024, 05:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-02-15 05:15
Updated : 2025-06-04 21:24
NVD link : CVE-2024-25940
Mitre link : CVE-2024-25940
CVE.ORG link : CVE-2024-25940
JSON object : View
Products Affected
                freebsd
- freebsd
CWE
                
                    
                        
                        CWE-922
                        
            Insecure Storage of Sensitive Information
