First published: Tue Nov 12 2024(Updated: )
BPF Compiler Collection (BCC) is a toolkit for easier creation of efficient kernel tracing and manipulation programs. BCC uses the extended Berkeley Packet Filter (eBPF) tool.<br>Security Fix(es):<br><li> bcc: unprivileged users can force loading of compromised linux headers (CVE-2024-2314)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.5 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/bcc | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/bcc | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/bcc-debuginfo | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/bcc-debugsource | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/bcc-tools | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/bcc-tools-debuginfo | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/libbpf-tools | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/libbpf-tools-debuginfo | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/python3-bcc | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/bcc-debuginfo | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/bcc-debugsource | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/bcc-tools | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/bcc-tools-debuginfo | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/libbpf-tools | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/libbpf-tools-debuginfo | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/bcc | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/bcc-debuginfo | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/bcc-debugsource | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/bcc-tools | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/bcc-tools-debuginfo | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/libbpf-tools | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/libbpf-tools-debuginfo | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/bcc | <0.30.0-6.el9.aa | 0.30.0-6.el9.aa |
redhat/bcc-debuginfo | <0.30.0-6.el9.aa | 0.30.0-6.el9.aa |
redhat/bcc-debugsource | <0.30.0-6.el9.aa | 0.30.0-6.el9.aa |
redhat/bcc-tools | <0.30.0-6.el9.aa | 0.30.0-6.el9.aa |
redhat/bcc-tools-debuginfo | <0.30.0-6.el9.aa | 0.30.0-6.el9.aa |
redhat/libbpf-tools | <0.30.0-6.el9.aa | 0.30.0-6.el9.aa |
redhat/libbpf-tools-debuginfo | <0.30.0-6.el9.aa | 0.30.0-6.el9.aa |
redhat/bcc-devel | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/bcc-doc | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/bcc-devel | <0.30.0-6.el9 | 0.30.0-6.el9 |
redhat/bcc-devel | <0.30.0-6.el9.aa | 0.30.0-6.el9.aa |
redhat/bcc-devel | <0.30.0-6.el9 | 0.30.0-6.el9 |
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat CodeReady Linux Builder for ARM 64 | ||
Red Hat CodeReady Linux Builder for IBM z Systems |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The affected products include Red Hat CodeReady Linux Builder, Red Hat Enterprise Linux, and multiple architectures like x86_64, ARM 64, and IBM z Systems.
RHSA-2024:9187 has a critical severity level due to the potential for unprivileged users to exploit the vulnerability.
To mitigate the risks, update the bcc package to version 0.30.0-6.el9 or later.
The vulnerability allows unprivileged users to load compromised Linux headers, which can lead to exploitation.
Yes, the recommended version to ensure safety is bcc 0.30.0-6.el9 or later.