Zercurity data services
  • Summary
  • Applications (1)
  • Packages (0)
  • Vulnerabilities (10)

libbpf4.19

Hashes
eBPF helper library (shared library) libbpf is a library for loading eBPF programs and reading and manipulating eBPF objects from user-space.
  • SHA256: 7e970e7ec2a621ef87d3ec2544dfe9523633328055ff174a05ac0a8b0d5754a9
  • SHA1: ad214f731a00a72f420aaf5ffd4b039ddfad7d57
  • MD5: 1ebddbafd42c2688ace08cb544d2fe5d
Information
  • Version: 4.19.146-1
  • Filename: libbpf4.19_4.19.146-1_i386.deb
  • Size: 539
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: libc6 (>= 2.26), libelf1 (>= 0.131)

Applications

NameTypeArchSizeRisk
libbpf.so.4.19
/usr/lib/i386-linux-gnu/libbpf.so.4.19
591880

Vulnerabilities

NameRiskSourceFixed
CVE-2020-1235188DSA
DSA-4774-1
CVE-2020-1235265DSA
DSA-4774-1
CVE-2020-2521160DSA
DSA-4774-1
CVE-2020-2564375DSA
DSA-4774-1
CVE-2020-2564575DSA
DSA-4774-1
CVE-2020-1235188DSA
DSA-4774-1
libbpf4.19
4.19.152-1
CVE-2020-1235265DSA
DSA-4774-1
libbpf4.19
4.19.152-1
CVE-2020-2521160DSA
DSA-4774-1
libbpf4.19
4.19.152-1
CVE-2020-2564375DSA
DSA-4774-1
libbpf4.19
4.19.152-1
CVE-2020-2564575DSA
DSA-4774-1
libbpf4.19
4.19.152-1

Raw Object

{
  "sha256": "7e970e7ec2a621ef87d3ec2544dfe9523633328055ff174a05ac0a8b0d5754a9",
  "sha1": "ad214f731a00a72f420aaf5ffd4b039ddfad7d57",
  "md5": "1ebddbafd42c2688ace08cb544d2fe5d",
  "type": "DEB",
  "arch": "I386",
  "name": "libbpf4.19",
  "filename": "libbpf4.19_4.19.146-1_i386.deb",
  "size": 539,
  "description": "eBPF helper library (shared library)\nlibbpf is a library for loading eBPF programs and reading and manipulating\neBPF objects from user-space.",
  "url": "https://www.kernel.org/",
  "version": "4.19.146-1",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "libc6 (>= 2.26), libelf1 (>= 0.131)",
  "applications": [
    {
      "path": "/usr/lib/i386-linux-gnu/libbpf.so.4.19",
      "sha256": "97d3232f8e25b6270470ac0645bfd7c959fa2acdca862eb2a9ef9d9d1036b091",
      "sha1": "aa6bb21fa0b98e96ff519820cb3565f2bc47a6c5",
      "md5": "5828d3c0803e4db1370aab3645983c7d",
      "name": "libbpf.so.4.19",
      "size": 59188,
      "description": null,
      "package": 1067317,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-09T01:20:43+00:00",
      "updated_at": "2021-03-09T01:20:43+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2020-12351",
      "risk": 88,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": null,
      "created_at": "2021-03-09T07:31:36+00:00",
      "updated_at": "2021-03-09T07:31:36+00:00"
    },
    {
      "name": "CVE-2020-12352",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": null,
      "created_at": "2021-03-09T07:31:46+00:00",
      "updated_at": "2021-03-09T07:31:46+00:00"
    },
    {
      "name": "CVE-2020-25211",
      "risk": 60,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": null,
      "created_at": "2021-03-09T07:31:57+00:00",
      "updated_at": "2021-03-09T07:31:57+00:00"
    },
    {
      "name": "CVE-2020-25643",
      "risk": 75,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": null,
      "created_at": "2021-03-09T07:32:06+00:00",
      "updated_at": "2021-03-09T07:32:06+00:00"
    },
    {
      "name": "CVE-2020-25645",
      "risk": 75,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": null,
      "created_at": "2021-03-09T07:32:15+00:00",
      "updated_at": "2021-03-09T07:32:15+00:00"
    },
    {
      "name": "CVE-2020-12351",
      "risk": 88,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "deb79309352c87a9c49b7208d1a6afc89aa4d46c3172c0d720674c17d458e3e7",
        "name": "libbpf4.19",
        "version": "4.19.152-1",
        "filename": "libbpf4.19_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-21T07:40:15+00:00",
      "updated_at": "2021-03-21T07:40:15+00:00"
    },
    {
      "name": "CVE-2020-12352",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "deb79309352c87a9c49b7208d1a6afc89aa4d46c3172c0d720674c17d458e3e7",
        "name": "libbpf4.19",
        "version": "4.19.152-1",
        "filename": "libbpf4.19_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-21T07:40:18+00:00",
      "updated_at": "2021-03-21T07:40:18+00:00"
    },
    {
      "name": "CVE-2020-25211",
      "risk": 60,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "deb79309352c87a9c49b7208d1a6afc89aa4d46c3172c0d720674c17d458e3e7",
        "name": "libbpf4.19",
        "version": "4.19.152-1",
        "filename": "libbpf4.19_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-21T07:40:20+00:00",
      "updated_at": "2021-03-21T07:40:20+00:00"
    },
    {
      "name": "CVE-2020-25643",
      "risk": 75,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "deb79309352c87a9c49b7208d1a6afc89aa4d46c3172c0d720674c17d458e3e7",
        "name": "libbpf4.19",
        "version": "4.19.152-1",
        "filename": "libbpf4.19_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-21T07:40:21+00:00",
      "updated_at": "2021-03-21T07:40:21+00:00"
    },
    {
      "name": "CVE-2020-25645",
      "risk": 75,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "deb79309352c87a9c49b7208d1a6afc89aa4d46c3172c0d720674c17d458e3e7",
        "name": "libbpf4.19",
        "version": "4.19.152-1",
        "filename": "libbpf4.19_4.19.152-1_i386.deb"
      },
      "created_at": "2021-03-21T07:40:23+00:00",
      "updated_at": "2021-03-21T07:40:23+00:00"
    }
  ],
  "risk": 88,
  "vulnerable": 88,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2020-09-18T21:23:15+00:00",
  "updated_at": "2021-03-09T01:20:43+00:00",
  "deleted_at": null
}