2db23ca060682674d34823a56204f30b80325fb4c7662a248a1a5f7750515db3
c9a13974fb73e75db0c386fa0aae4951d25e790a
afb793dbcdbc0fdbb31f8ab05e90a859
5.10.158-2
bpftool_5.10.158-2_amd64.deb
1009
DEB
linux
AMD64
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.26), libcap2 (>= 1:2.10), libelf1 (>= 0.142), zlib1g (>= 1:1.2.3.3)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
bpftool /usr/sbin/bpftool | 392936 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-2873 | 55 | DSA DSA-5324-1 | linux-kbuild-5.10 5.10.162-1 |
CVE-2022-3545 | 78 | DSA DSA-5324-1 | linux-kbuild-5.10 5.10.162-1 |
CVE-2022-3623 | 8 | DSA DSA-5324-1 | linux-kbuild-5.10 5.10.162-1 |
CVE-2022-4696 | 0 | DSA DSA-5324-1 | linux-kbuild-5.10 5.10.162-1 |
CVE-2022-36280 | 55 | DSA DSA-5324-1 | linux-kbuild-5.10 5.10.162-1 |
CVE-2022-41218 | 55 | DSA DSA-5324-1 | linux-kbuild-5.10 5.10.162-1 |
CVE-2022-45934 | 8 | DSA DSA-5324-1 | linux-kbuild-5.10 5.10.162-1 |
CVE-2022-47929 | 6 | DSA DSA-5324-1 | linux-kbuild-5.10 5.10.162-1 |
CVE-2023-0179 | 8 | DSA DSA-5324-1 | linux-kbuild-5.10 5.10.162-1 |
CVE-2023-0266 | 8 | DSA DSA-5324-1 | linux-kbuild-5.10 5.10.162-1 |
CVE-2023-0394 | 6 | DSA DSA-5324-1 | linux-kbuild-5.10 5.10.162-1 |
CVE-2023-23454 | 0 | DSA DSA-5324-1 | linux-kbuild-5.10 5.10.162-1 |
CVE-2023-23455 | 0 | DSA DSA-5324-1 | linux-kbuild-5.10 5.10.162-1 |
{ "sha256": "2db23ca060682674d34823a56204f30b80325fb4c7662a248a1a5f7750515db3", "sha1": "c9a13974fb73e75db0c386fa0aae4951d25e790a", "md5": "afb793dbcdbc0fdbb31f8ab05e90a859", "type": "DEB", "arch": "AMD64", "name": "bpftool", "filename": "bpftool_5.10.158-2_amd64.deb", "size": 1009, "description": "Inspection and simple manipulation of BPF programs and maps\nThe bpftool command allows for inspection and simple modification of\nBerkeley Packet Filter (BPF) objects on the system.", "url": "https://www.kernel.org/", "version": "5.10.158-2", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.26), libcap2 (>= 1:2.10), libelf1 (>= 0.142), zlib1g (>= 1:1.2.3.3)", "applications": [ { "path": "/usr/sbin/bpftool", "sha256": "e927a8c5176b2de822588260a4ba6924cdb85b1d6a9efaee4d05b46504328186", "sha1": "af4f25c1dfd541b823dd0105214fcc515fba3570", "md5": "fc3c8af25e61a67a9b5e81d10ec65a48", "name": "bpftool", "size": 392936, "description": null, "package": 4982852, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-16T10:14:23+00:00", "updated_at": "2022-12-16T10:14:23+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-2873", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b", "name": "linux-kbuild-5.10", "version": "5.10.162-1", "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:29+00:00", "updated_at": "2023-01-25T10:38:29+00:00" }, { "name": "CVE-2022-3545", "risk": 78, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b", "name": "linux-kbuild-5.10", "version": "5.10.162-1", "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:31+00:00", "updated_at": "2023-01-25T10:38:31+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b", "name": "linux-kbuild-5.10", "version": "5.10.162-1", "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:32+00:00", "updated_at": "2023-01-25T10:38:32+00:00" }, { "name": "CVE-2022-4696", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b", "name": "linux-kbuild-5.10", "version": "5.10.162-1", "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:34+00:00", "updated_at": "2023-01-25T10:38:34+00:00" }, { "name": "CVE-2022-36280", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b", "name": "linux-kbuild-5.10", "version": "5.10.162-1", "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:35+00:00", "updated_at": "2023-01-25T10:38:35+00:00" }, { "name": "CVE-2022-41218", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b", "name": "linux-kbuild-5.10", "version": "5.10.162-1", "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:36+00:00", "updated_at": "2023-01-25T10:38:36+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b", "name": "linux-kbuild-5.10", "version": "5.10.162-1", "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:38+00:00", "updated_at": "2023-01-25T10:38:38+00:00" }, { "name": "CVE-2022-47929", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b", "name": "linux-kbuild-5.10", "version": "5.10.162-1", "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:39+00:00", "updated_at": "2023-01-25T10:38:39+00:00" }, { "name": "CVE-2023-0179", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b", "name": "linux-kbuild-5.10", "version": "5.10.162-1", "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:40+00:00", "updated_at": "2023-01-25T10:38:40+00:00" }, { "name": "CVE-2023-0266", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b", "name": "linux-kbuild-5.10", "version": "5.10.162-1", "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:42+00:00", "updated_at": "2023-01-25T10:38:42+00:00" }, { "name": "CVE-2023-0394", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b", "name": "linux-kbuild-5.10", "version": "5.10.162-1", "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:43+00:00", "updated_at": "2023-01-25T10:38:43+00:00" }, { "name": "CVE-2023-23454", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b", "name": "linux-kbuild-5.10", "version": "5.10.162-1", "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:45+00:00", "updated_at": "2023-01-25T10:38:45+00:00" }, { "name": "CVE-2023-23455", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b", "name": "linux-kbuild-5.10", "version": "5.10.162-1", "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:46+00:00", "updated_at": "2023-01-25T10:38:46+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-12-14T06:13:44+00:00", "updated_at": "2022-12-16T10:14:23+00:00", "deleted_at": null }