First published: Tue Nov 05 2024(Updated: )
BPF Compiler Collection (BCC) is a toolkit for easier creation of efficient kernel tracing and manipulation programs. BCC uses the extended Berkeley Packet Filter (eBPF) tool.<br>Security Fix(es):<br><li> bcc: unprivileged users can force loading of compromised linux headers (CVE-2024-2314)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bcc | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/bcc | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/bcc-debuginfo | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/bcc-debugsource | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/bcc-tools | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/bcc-tools-debuginfo | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/python3-bcc | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/bcc-debuginfo | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/bcc-debugsource | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/bcc-tools | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/bcc-tools-debuginfo | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/python3-bcc | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/bcc | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/bcc-debuginfo | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/bcc-debugsource | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/bcc-tools | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/bcc-tools-debuginfo | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/python3-bcc | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/bcc | <0.25.0-9.el8_10.aa | 0.25.0-9.el8_10.aa |
redhat/bcc-debuginfo | <0.25.0-9.el8_10.aa | 0.25.0-9.el8_10.aa |
redhat/bcc-debugsource | <0.25.0-9.el8_10.aa | 0.25.0-9.el8_10.aa |
redhat/bcc-tools | <0.25.0-9.el8_10.aa | 0.25.0-9.el8_10.aa |
redhat/bcc-tools-debuginfo | <0.25.0-9.el8_10.aa | 0.25.0-9.el8_10.aa |
redhat/python3-bcc | <0.25.0-9.el8_10.aa | 0.25.0-9.el8_10.aa |
redhat/bcc-devel | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/bcc-doc | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/bcc-devel | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
redhat/bcc-devel | <0.25.0-9.el8_10.aa | 0.25.0-9.el8_10.aa |
redhat/bcc-devel | <0.25.0-9.el8_10 | 0.25.0-9.el8_10 |
Red Hat CodeReady Linux Builder for ARM 64 | ||
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat CodeReady Linux Builder for IBM z Systems |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:8831 is classified as low.
To fix RHSA-2024:8831, update the affected bcc package to version 0.25.0-9.el8_10.
RHSA-2024:8831 addresses the vulnerability where unprivileged users can force loading of compromised Linux headers.
Affected products include multiple versions of Red Hat Enterprise Linux and Red Hat CodeReady Linux Builder for various architectures.
RHSA-2024:8831 was released as part of a security advisory by Red Hat.