Untriaged
Permalink
CVE-2024-2313
2.8 LOW
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): HIGH
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): LOW
If kernel headers need to be extracted, bpftrace will attempt …
If kernel headers need to be extracted, bpftrace will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
References
-
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2313 issue-tracking
-
-
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2313 issue-tracking
-
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2313 issue-tracking
-
-
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2313 issue-tracking
-
Affected products
bpftrace
- <v0.20.2
Matching in nixpkgs
pkgs.bpftrace
High-level tracing language for Linux eBPF
pkgs.linuxPackages_zen.bpftrace
High-level tracing language for Linux eBPF
pkgs.emacsPackages.bpftrace-mode
None
-
nixos-unstable 20190608.2201
- nixpkgs-unstable 20190608.2201
- nixos-unstable-small 20190608.2201
pkgs.linuxKernel.packages.linux_6_1.bpftrace
High-level tracing language for Linux eBPF
-
nixos-unstable 0.21.2
pkgs.linuxKernel.packages.linux_5_10.bpftrace
High-level tracing language for Linux eBPF
pkgs.linuxKernel.packages.linux_libre.bpftrace
High-level tracing language for Linux eBPF
-
nixos-unstable 0.21.2
pkgs.linuxKernel.packages.linux_latest_libre.bpftrace
High-level tracing language for Linux eBPF
Package maintainers
-
@rvl Rodney Lorrimar <dev+nix@rodney.id.au>
-
@mfrw Muhammad Falak R Wani <falakreyaz@gmail.com>
-
@thoughtpolice Austin Seipp <aseipp@pobox.com>
-
@martinetd Dominique Martinet <f.ktfhrvnznqxacf@noclue.notk.org>