Vulnerability Description
If kernel headers need to be extracted, bpftrace will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bpftrace | Bpftrace | < 0.20.2 |
| Linux | Linux Kernel | - |
Related Weaknesses (CWE)
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2313Third Party Advisory
- https://github.com/bpftrace/bpftrace/commit/4be4b7191acb8218240e6b7178c30fa8c9b5Patch
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2313Third Party Advisory
- https://github.com/bpftrace/bpftrace/commit/4be4b7191acb8218240e6b7178c30fa8c9b5Patch
FAQ
What is CVE-2024-2313?
CVE-2024-2313 is a vulnerability with a CVSS score of 2.8 (LOW). If kernel headers need to be extracted, bpftrace will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux dis...
How severe is CVE-2024-2313?
CVE-2024-2313 has been rated LOW with a CVSS base score of 2.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-2313?
Check the references section above for vendor advisories and patch information. Affected products include: Bpftrace Bpftrace, Linux Linux Kernel.