If kernel headers need to be extracted, bpftrace will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
Creating and using insecure temporary files can leave application and system data vulnerable to attack.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Red Hat Enterprise Linux 8 | RedHat | bpftrace-0:0.16.0-6.el8_10 | * |
Red Hat Enterprise Linux 9 | RedHat | bpftrace-0:0.21.1-1.el9 | * |
Bpftrace | Ubuntu | upstream | * |