RLSA-2024:9188

Source
https://errata.rockylinux.org/RLSA-2024:9188
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:9188.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2024:9188
Related
Published
2025-03-17T20:16:49.937392Z
Modified
2025-03-17T20:19:08.439935Z
Summary
Low: bpftrace security update
Details

BPFtrace is a high-level tracing language for Linux enhanced Berkeley Packet Filter (eBPF) available in recent Linux kernels (4.x). BPFtrace uses LLVM as a backend to compile scripts to BPF-bytecode and makes use of BCC for interacting with the Linux BPF system, as well as existing Linux tracing capabilities: kernel dynamic tracing (kprobes), user-level dynamic tracing (uprobes), and tracepoints. The BPFtrace language is inspired by awk and C, and predecessor tracers such as DTrace and SystemTap

Security Fix(es):

  • bpftrace: unprivileged users can force loading of compromised linux headers (CVE-2024-2313)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 9.5 Release Notes linked from the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / bpftrace

Package

Name
bpftrace
Purl
pkg:rpm/rocky-linux/bpftrace?distro=rocky-linux-9&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:0.21.1-1.el9