control: fixed -1 0.30.0+ds-1 control: close -1 thanks On Fri, 24 May 2024 16:54:38 +0200 =?UTF-8?Q?Moritz_M=C3=BChlenhoff?= <j...@inutil.org> wrote:
Source: bpfcc X-Debbugs-CC: t...@security.debian.org Severity: important Tags: securityHi, The following vulnerability was published for bpfcc. CVE-2024-2314[0]: | If kernel headers need to be extracted, bcc will attempt to load | them from a temporary directory. An unprivileged attacker could use | this to force bcc to load compromised linux headers. Linux | distributions which provide kernel headers by default are not | affected by default. Fixed by: https://github.com/iovisor/bcc/commit/008ea09e891194c072f2a9305a3c872a241dc342 (v0.30.0) If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-2314 https://www.cve.org/CVERecord?id=CVE-2024-2314 Please adjust the affected versions in the BTS as needed.
OpenPGP_signature.asc
Description: OpenPGP digital signature