CVE-2024-2313

NameCVE-2024-2313
DescriptionIf kernel headers need to be extracted, bpftrace will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
bpftrace (PTS)buster0.8+git60-gccac69c2239b-2fixed
bullseye0.11.3-5+deb11u1vulnerable
bookworm0.17.0-1vulnerable
sid0.20.2-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
bpftracesourcebuster(not affected)
bpftracesource(unstable)(unfixed)

Notes

[bookworm] - bpftrace <no-dsa> (Minor issue)
[bullseye] - bpftrace <no-dsa> (Minor issue)
[buster] - bpftrace <not-affected> (Vulnerable code introduced later)
https://github.com/bpftrace/bpftrace/commit/4be4b7191acb8218240e6b7178c30fa8c9b59998
Introduced by: https://github.com/bpftrace/bpftrace/commit/896fafbe925385500c6626b19348739142944b88 (v0.9.3)

Search for package or bug name: Reporting problems