2.8 Low
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L
3.5 Low
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.2%
If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
[
{
"packageName": "bcc",
"product": "BPF Compiler Collection",
"vendor": "IOVisor",
"repo": "https://github.com/iovisor/bcc",
"platforms": [
"Linux"
],
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "008ea09e891194c072f2a9305a3c872a241dc342",
"versionType": "commit-id"
}
]
}
]
2.8 Low
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L
3.5 Low
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.2%