If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Bpf_compiler_collection | Iovisor | * | 0.30.0 (excluding) | 
| Red Hat Enterprise Linux 8 | RedHat | bcc-0:0.25.0-9.el8_10 | * | 
| Red Hat Enterprise Linux 9 | RedHat | bcc-0:0.30.0-6.el9 | * | 
| Bpfcc | Ubuntu | bionic | * | 
| Bpfcc | Ubuntu | upstream | * |