summaryrefslogtreecommitdiffstats
path: root/dynamic-layers/openembedded-layer/recipes-devtools/bcc/bcc_0.24.0.bb
diff options
context:
space:
mode:
authorDivya Chellam <divya.chellam@windriver.com>2025-04-08 04:45:25 +0000
committerKhem Raj <raj.khem@gmail.com>2025-04-10 17:55:17 -0700
commit8a1d0a1993040ab9d2fb7259b71e4c9582f5cd17 (patch)
tree82060d65478ad391d27873d58119a6f7e9eaf7f2 /dynamic-layers/openembedded-layer/recipes-devtools/bcc/bcc_0.24.0.bb
parent0356fab9b788e6071471f82743964aec1775cd71 (diff)
downloadmeta-clang-kirkstone.tar.gz
bcc: fix CVE-2024-2314kirkstone
If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default. Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-2314 Upstream-patch: https://github.com/iovisor/bcc/commit/008ea09e891194c072f2a9305a3c872a241dc342 Signed-off-by: Divya Chellam <divya.chellam@windriver.com>
Diffstat (limited to 'dynamic-layers/openembedded-layer/recipes-devtools/bcc/bcc_0.24.0.bb')
-rw-r--r--dynamic-layers/openembedded-layer/recipes-devtools/bcc/bcc_0.24.0.bb1
1 files changed, 1 insertions, 0 deletions
diff --git a/dynamic-layers/openembedded-layer/recipes-devtools/bcc/bcc_0.24.0.bb b/dynamic-layers/openembedded-layer/recipes-devtools/bcc/bcc_0.24.0.bb
index b24e153..a3ceddb 100644
--- a/dynamic-layers/openembedded-layer/recipes-devtools/bcc/bcc_0.24.0.bb
+++ b/dynamic-layers/openembedded-layer/recipes-devtools/bcc/bcc_0.24.0.bb
@@ -29,6 +29,7 @@ SRC_URI = "gitsm://github.com/iovisor/bcc;branch=master;protocol=https \
29 file://0001-Vendor-just-enough-extra-headers-to-allow-libbpf-to-.patch \ 29 file://0001-Vendor-just-enough-extra-headers-to-allow-libbpf-to-.patch \
30 file://run-ptest \ 30 file://run-ptest \
31 file://ptest_wrapper.sh \ 31 file://ptest_wrapper.sh \
32 file://CVE-2024-2314.patch \
32 " 33 "
33 34
34SRCREV = "8f40d6f57a8d94e7aee74ce358572d34d31b4ed4" 35SRCREV = "8f40d6f57a8d94e7aee74ce358572d34d31b4ed4"