If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Bpf_compiler_collection | Iovisor | * | 0.30.0 (excluding) |
| Red Hat Enterprise Linux 8 | RedHat | bcc-0:0.25.0-9.el8_10 | * |
| Red Hat Enterprise Linux 9 | RedHat | bcc-0:0.30.0-6.el9 | * |
| Bpfcc | Ubuntu | bionic | * |
| Bpfcc | Ubuntu | upstream | * |