CVE-2024-2314Improper Access Control in Azl3 BCC 0.29.1-2 ON Azure Linux 3.0

Severity
2.5LOWNVD
EPSS
0.1%
top 79.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 10
Latest updateMar 12

Description

If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:NExploitability: 1.0 | Impact: 1.4

Affected Packages5 packages

debiandebian/bpfcc< bpfcc 0.31.0+ds-2 (forky)
CVEListV5iovisor/bpf_compiler_collection< 008ea09e891194c072f2a9305a3c872a241dc342

Patches

🔴Vulnerability Details

2
GHSA
GHSA-883r-qq2g-w5xj: If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory2024-03-11
OSV
CVE-2024-2314: If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory2024-03-10

📋Vendor Advisories

3
Microsoft
If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distribu2024-03-12
Red Hat
bcc: unprivileged users can force loading of compromised linux headers2024-03-10
Debian
CVE-2024-2314: bpfcc - If kernel headers need to be extracted, bcc will attempt to load them from a tem...2024