Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2024:8831

Опубликовано: 08 нояб. 2024
Источник: rocky
Оценка: Low

Описание

Low: bcc security update

BPF Compiler Collection (BCC) is a toolkit for easier creation of efficient kernel tracing and manipulation programs. BCC uses the extended Berkeley Packet Filter (eBPF) tool.

Security Fix(es):

  • bcc: unprivileged users can force loading of compromised linux headers (CVE-2024-2314)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
bccx86_649.el8_10bcc-0.25.0-9.el8_10.x86_64.rpm
bcc-toolsx86_649.el8_10bcc-tools-0.25.0-9.el8_10.x86_64.rpm
python3-bccx86_649.el8_10python3-bcc-0.25.0-9.el8_10.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 2.8
ubuntu
больше 1 года назад

If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.

CVSS3: 2.8
redhat
больше 1 года назад

If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.

CVSS3: 2.8
nvd
больше 1 года назад

If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.

CVSS3: 2.8
debian
больше 1 года назад

If kernel headers need to be extracted, bcc will attempt to load them ...

CVSS3: 2.8
github
больше 1 года назад

If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.