If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
History

Wed, 13 Nov 2024 02:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:enterprise_linux:9

Wed, 06 Nov 2024 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/a:redhat:enterprise_linux:8
Vendors & Products Redhat
Redhat enterprise Linux

Wed, 30 Oct 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published: 2024-03-10T22:54:31.563Z

Updated: 2024-10-30T18:04:20.999Z

Reserved: 2024-03-07T23:54:22.362Z

Link: CVE-2024-2314

cve-icon Vulnrichment

Updated: 2024-08-01T19:11:53.466Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-03-10T23:15:53.967

Modified: 2024-11-21T09:09:29.397

Link: CVE-2024-2314

cve-icon Redhat

Severity : Low

Publid Date: 2024-03-10T00:00:00Z

Links: CVE-2024-2314 - Bugzilla