If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Bpf_compiler_collection | Iovisor | * | 0.30.0 (excluding) |
Red Hat Enterprise Linux 8 | RedHat | bcc-0:0.25.0-9.el8_10 | * |
Red Hat Enterprise Linux 9 | RedHat | bcc-0:0.30.0-6.el9 | * |
Bpfcc | Ubuntu | bionic | * |
Bpfcc | Ubuntu | upstream | * |