If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
Metrics
Affected Vendors & Products
References
History
Wed, 13 Nov 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:9 |
Wed, 06 Nov 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/a:redhat:enterprise_linux:8 | |
Vendors & Products |
Redhat
Redhat enterprise Linux |
Wed, 30 Oct 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: canonical
Published: 2024-03-10T22:54:31.563Z
Updated: 2024-10-30T18:04:20.999Z
Reserved: 2024-03-07T23:54:22.362Z
Link: CVE-2024-2314
Vulnrichment
Updated: 2024-08-01T19:11:53.466Z
NVD
Status : Awaiting Analysis
Published: 2024-03-10T23:15:53.967
Modified: 2024-11-21T09:09:29.397
Link: CVE-2024-2314
Redhat