Описание
If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | not-affected | kernel headers are provided by system |
esm-apps/bionic | not-affected | kernel headers are provided by system |
esm-apps/focal | not-affected | kernel headers are provided by system |
esm-apps/jammy | not-affected | kernel headers are provided by system |
focal | not-affected | kernel headers are provided by system |
jammy | not-affected | kernel headers are provided by system |
mantic | not-affected | kernel headers are provided by system |
noble | not-affected | kernel headers are provided by system |
trusty | DNE |
Показывать по
Ссылки на источники
2.8 Low
CVSS3
Связанные уязвимости
If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
If kernel headers need to be extracted, bcc will attempt to load them ...
If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
2.8 Low
CVSS3