Описание
ELSA-2024-9187: bcc security update (LOW)
[0.30.0-6]
- Rebuild with LLVM 18 (RHEL-28684)
[0.30.0-5]
- Drop python3-pyelftools dependency on s390x until it is available
[0.30.0-4]
- Exclude btrfs and f2fs libbpf tools (RHEL-36579)
[0.30.0-3]
- Really prevent the loading of compromised headers (RHEL-28769, CVE-2024-2314)
- Add python3-pyelftools dependency (RHEL-36583)
[0.30.0-2]
- Rebuild (distrobaker didn't take last build)
[0.30.0-1]
- Rebase bcc to 0.30.0 (RHEL-29031)
- Exclude bpf-numamove on s390x (RHEL-32327)
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
bcc
0.30.0-6.el9
bcc-devel
0.30.0-6.el9
bcc-doc
0.30.0-6.el9
bcc-tools
0.30.0-6.el9
libbpf-tools
0.30.0-6.el9
python3-bcc
0.30.0-6.el9
Oracle Linux x86_64
bcc
0.30.0-6.el9
bcc-devel
0.30.0-6.el9
bcc-doc
0.30.0-6.el9
bcc-tools
0.30.0-6.el9
libbpf-tools
0.30.0-6.el9
python3-bcc
0.30.0-6.el9
Связанные CVE
Связанные уязвимости
If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
If kernel headers need to be extracted, bcc will attempt to load them ...