[ALSA-2024:8830] Low: bpftrace security update
Type:
security
Severity:
low
Release date:
2024-11-06
Description:
BPFtrace is a high-level tracing language for Linux enhanced Berkeley Packet Filter (eBPF) available in recent Linux kernels (4.x). BPFtrace uses LLVM as a backend to compile scripts to BPF-bytecode and makes use of BCC for interacting with the Linux BPF system, as well as existing Linux tracing capabilities: kernel dynamic tracing (kprobes), user-level dynamic tracing (uprobes), and tracepoints. The BPFtrace language is inspired by awk and C, and predecessor tracers such as DTrace and SystemTap Security Fix(es): * bpftrace: unprivileged users can force loading of compromised linux headers (CVE-2024-2313) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 bpftrace-0.16.0-6.el8_10.aarch64.rpm 53b59bc64faad29e59b0ef4fef4f50bb146768decccbd16902a35e7ec2492963
ppc64le bpftrace-0.16.0-6.el8_10.ppc64le.rpm 19d830e8162caa51cc667ee29404d859698feff61d1d2f5e092beeae70b0f943
s390x bpftrace-0.16.0-6.el8_10.s390x.rpm 768c20fe1316b24bd30538ff081730218888b9e2ad133fb1be752375b7746957
x86_64 bpftrace-0.16.0-6.el8_10.x86_64.rpm 3eeafa6b17eb8fce7b2fdb3047e642266019cf159829d20ccf0289196a5adcf4
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.