|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2024-2313: bpftrace: unprivileged attacker could force bcc to load compromised linux headers | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | SMASH SMASH <smash_bz> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED UPSTREAM | QA Contact: | Security Team bot <security-team> |
| Severity: | Minor | ||
| Priority: | P3 - Medium | CC: | abergmann, shung-hsi.yu |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/396793/ | ||
| See Also: | https://bugzilla.suse.com/show_bug.cgi?id=1221229 | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2024-2313:2.5:(AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N) | ||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
SMASH SMASH
2024-03-11 07:37:49 UTC
(In reply to SMASH SMASH from comment #0) > ... Linux distributions which provide > kernel headers by default are not affected by default. Sounds like we're not affected, but I'll look into this in more detail. Similar to what bcc does in bug 1221229, bpftrace only unpacks kernel header if kernel is built with CONFIG_IKHEADERS[1,2], hence so this vulnerability does not apply to us. Reassigning back to security team. 1: https://github.com/bpftrace/bpftrace/commit/896fafbe9253 2: https://github.com/bpftrace/bpftrace/blob/4be4b71/src/utils.cpp#L824-L832 fixed upstream, we are not affected FWIW previous fix was not enough and there's a new one https://github.com/bpftrace/bpftrace/pull/3190/commits/e0919e500ecb8ec181d879efd6b600004d6cf2a9 Again, we're not affected, so I'm updating Factory/Tumbleweed version of bpftrace purely to align with the latest upstream's version rather than for the security fix. |