RLSA-2024:8830

Source
https://errata.rockylinux.org/RLSA-2024:8830
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:8830.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2024:8830
Related
Published
2024-11-08T15:56:47.559546Z
Modified
2024-11-08T15:59:27.827646Z
Summary
Low: bpftrace security update
Details

BPFtrace is a high-level tracing language for Linux enhanced Berkeley Packet Filter (eBPF) available in recent Linux kernels (4.x). BPFtrace uses LLVM as a backend to compile scripts to BPF-bytecode and makes use of BCC for interacting with the Linux BPF system, as well as existing Linux tracing capabilities: kernel dynamic tracing (kprobes), user-level dynamic tracing (uprobes), and tracepoints. The BPFtrace language is inspired by awk and C, and predecessor tracers such as DTrace and SystemTap

Security Fix(es):

  • bpftrace: unprivileged users can force loading of compromised linux headers (CVE-2024-2313)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / bpftrace

Package

Name
bpftrace
Purl
pkg:rpm/rocky-linux/bpftrace?distro=rocky-linux-8&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:0.16.0-6.el8_10