If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Red Hat Enterprise Linux 8 | RedHat | bcc-0:0.25.0-9.el8_10 | * |
Red Hat Enterprise Linux 9 | RedHat | bcc-0:0.30.0-6.el9 | * |
Bpfcc | Ubuntu | bionic | * |
Bpfcc | Ubuntu | upstream | * |