CVE-2024-2314

NameCVE-2024-2314
DescriptionIf kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1071747

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
bpfcc (PTS)bullseye0.18.0+ds-2vulnerable
bookworm0.26.0+ds-1vulnerable
sid, trixie0.30.0+ds-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
bpfccsourcebuster(not affected)
bpfccsource(unstable)(unfixed)1071747

Notes

[bookworm] - bpfcc <no-dsa> (Minor issue)
[bullseye] - bpfcc <no-dsa> (Minor issue)
[buster] - bpfcc <not-affected> (Vulnerable code introduced later)
Fixed by: https://github.com/iovisor/bcc/commit/008ea09e891194c072f2a9305a3c872a241dc342 (v0.30.0)
Introduced by: https://github.com/iovisor/bcc/commit/ae92f3ddb6aa5b81c750abf3540b99f24d219e67 (v0.10.0)
Attempt to mitigate in https://bugs.debian.org/1028479 (applied in 0.25.0+ds-2), and
resulting in the additional problem in https://bugs.debian.org/1068297

Search for package or bug name: Reporting problems