Bug 2269019 (CVE-2024-2314)

Summary: CVE-2024-2314 bcc: unprivileged users can force loading of compromised linux headers
Product: [Other] Security Response Reporter: TEJ RATHI <trathi>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in the BCC toolset. This issue occurs when extracting kernel headers, it tries to load them from a temporary directory. This issue could allow an attacker to force bcc to load compromised Linux headers by placing malicious headers in the temporary directory, leading to potential security risks, unauthorized access, or system compromise.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2269020    
Bug Blocks: 2269018    

Description TEJ RATHI 2024-03-11 14:35:31 UTC
If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2314
https://github.com/iovisor/bcc/commit/008ea09e891194c072f2a9305a3c872a241dc342

Comment 1 TEJ RATHI 2024-03-11 14:35:51 UTC
Created bcc tracking bugs for this issue:

Affects: fedora-all [bug 2269020]