Zercurity data services
  • Summary
  • Applications (1)
  • Packages (0)
  • Vulnerabilities (13)

bpftool

Hashes
Inspection and simple manipulation of BPF programs and maps The bpftool command allows for inspection and simple modification of Berkeley Packet Filter (BPF) objects on the system.
  • SHA256: 2db23ca060682674d34823a56204f30b80325fb4c7662a248a1a5f7750515db3
  • SHA1: c9a13974fb73e75db0c386fa0aae4951d25e790a
  • MD5: afb793dbcdbc0fdbb31f8ab05e90a859
Information
  • Version: 5.10.158-2
  • Filename: bpftool_5.10.158-2_amd64.deb
  • Size: 1009
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: libc6 (>= 2.26), libcap2 (>= 1:2.10), libelf1 (>= 0.142), zlib1g (>= 1:1.2.3.3)

Applications

NameTypeArchSizeRisk
bpftool
/usr/sbin/bpftool
3929360

Vulnerabilities

NameRiskSourceFixed
CVE-2022-287355DSA
DSA-5324-1
linux-kbuild-5.10
5.10.162-1
CVE-2022-354578DSA
DSA-5324-1
linux-kbuild-5.10
5.10.162-1
CVE-2022-36238DSA
DSA-5324-1
linux-kbuild-5.10
5.10.162-1
CVE-2022-46960DSA
DSA-5324-1
linux-kbuild-5.10
5.10.162-1
CVE-2022-3628055DSA
DSA-5324-1
linux-kbuild-5.10
5.10.162-1
CVE-2022-4121855DSA
DSA-5324-1
linux-kbuild-5.10
5.10.162-1
CVE-2022-459348DSA
DSA-5324-1
linux-kbuild-5.10
5.10.162-1
CVE-2022-479296DSA
DSA-5324-1
linux-kbuild-5.10
5.10.162-1
CVE-2023-01798DSA
DSA-5324-1
linux-kbuild-5.10
5.10.162-1
CVE-2023-02668DSA
DSA-5324-1
linux-kbuild-5.10
5.10.162-1
CVE-2023-03946DSA
DSA-5324-1
linux-kbuild-5.10
5.10.162-1
CVE-2023-234540DSA
DSA-5324-1
linux-kbuild-5.10
5.10.162-1
CVE-2023-234550DSA
DSA-5324-1
linux-kbuild-5.10
5.10.162-1

Raw Object

{
  "sha256": "2db23ca060682674d34823a56204f30b80325fb4c7662a248a1a5f7750515db3",
  "sha1": "c9a13974fb73e75db0c386fa0aae4951d25e790a",
  "md5": "afb793dbcdbc0fdbb31f8ab05e90a859",
  "type": "DEB",
  "arch": "AMD64",
  "name": "bpftool",
  "filename": "bpftool_5.10.158-2_amd64.deb",
  "size": 1009,
  "description": "Inspection and simple manipulation of BPF programs and maps\nThe bpftool command allows for inspection and simple modification of\nBerkeley Packet Filter (BPF) objects on the system.",
  "url": "https://www.kernel.org/",
  "version": "5.10.158-2",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "libc6 (>= 2.26), libcap2 (>= 1:2.10), libelf1 (>= 0.142), zlib1g (>= 1:1.2.3.3)",
  "applications": [
    {
      "path": "/usr/sbin/bpftool",
      "sha256": "e927a8c5176b2de822588260a4ba6924cdb85b1d6a9efaee4d05b46504328186",
      "sha1": "af4f25c1dfd541b823dd0105214fcc515fba3570",
      "md5": "fc3c8af25e61a67a9b5e81d10ec65a48",
      "name": "bpftool",
      "size": 392936,
      "description": null,
      "package": 4982852,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-12-16T10:14:23+00:00",
      "updated_at": "2022-12-16T10:14:23+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-2873",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b",
        "name": "linux-kbuild-5.10",
        "version": "5.10.162-1",
        "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:29+00:00",
      "updated_at": "2023-01-25T10:38:29+00:00"
    },
    {
      "name": "CVE-2022-3545",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b",
        "name": "linux-kbuild-5.10",
        "version": "5.10.162-1",
        "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:31+00:00",
      "updated_at": "2023-01-25T10:38:31+00:00"
    },
    {
      "name": "CVE-2022-3623",
      "risk": 8,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b",
        "name": "linux-kbuild-5.10",
        "version": "5.10.162-1",
        "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:32+00:00",
      "updated_at": "2023-01-25T10:38:32+00:00"
    },
    {
      "name": "CVE-2022-4696",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b",
        "name": "linux-kbuild-5.10",
        "version": "5.10.162-1",
        "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:34+00:00",
      "updated_at": "2023-01-25T10:38:34+00:00"
    },
    {
      "name": "CVE-2022-36280",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b",
        "name": "linux-kbuild-5.10",
        "version": "5.10.162-1",
        "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:35+00:00",
      "updated_at": "2023-01-25T10:38:35+00:00"
    },
    {
      "name": "CVE-2022-41218",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b",
        "name": "linux-kbuild-5.10",
        "version": "5.10.162-1",
        "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:36+00:00",
      "updated_at": "2023-01-25T10:38:36+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b",
        "name": "linux-kbuild-5.10",
        "version": "5.10.162-1",
        "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:38+00:00",
      "updated_at": "2023-01-25T10:38:38+00:00"
    },
    {
      "name": "CVE-2022-47929",
      "risk": 6,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b",
        "name": "linux-kbuild-5.10",
        "version": "5.10.162-1",
        "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:39+00:00",
      "updated_at": "2023-01-25T10:38:39+00:00"
    },
    {
      "name": "CVE-2023-0179",
      "risk": 8,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b",
        "name": "linux-kbuild-5.10",
        "version": "5.10.162-1",
        "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:40+00:00",
      "updated_at": "2023-01-25T10:38:40+00:00"
    },
    {
      "name": "CVE-2023-0266",
      "risk": 8,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b",
        "name": "linux-kbuild-5.10",
        "version": "5.10.162-1",
        "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:42+00:00",
      "updated_at": "2023-01-25T10:38:42+00:00"
    },
    {
      "name": "CVE-2023-0394",
      "risk": 6,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b",
        "name": "linux-kbuild-5.10",
        "version": "5.10.162-1",
        "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:43+00:00",
      "updated_at": "2023-01-25T10:38:43+00:00"
    },
    {
      "name": "CVE-2023-23454",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b",
        "name": "linux-kbuild-5.10",
        "version": "5.10.162-1",
        "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:45+00:00",
      "updated_at": "2023-01-25T10:38:45+00:00"
    },
    {
      "name": "CVE-2023-23455",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "72cfeb683b40888f19a396d52c4b1d67b3f04def364ea88e9fe2f7b01a1b407b",
        "name": "linux-kbuild-5.10",
        "version": "5.10.162-1",
        "filename": "linux-kbuild-5.10_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:46+00:00",
      "updated_at": "2023-01-25T10:38:46+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2022-12-14T06:13:44+00:00",
  "updated_at": "2022-12-16T10:14:23+00:00",
  "deleted_at": null
}