Zercurity data services
  • Summary
  • Applications (1)
  • Packages (0)
  • Vulnerabilities (14)

bpftool

Hashes
Inspection and simple manipulation of BPF programs and maps The bpftool command allows for inspection and simple modification of Berkeley Packet Filter (BPF) objects on the system.
  • SHA256: 89dc6cecd260f1202587853dae17c0ff59dc00d294afca3f84081955ba9b2329
  • SHA1: 288677eb3c7a67291e2acadb6f721a580e9bcfc1
  • MD5: eedd37ed99d197bc2cbd7f2933c85c2d
Information
  • Version: 5.10.120-1~bpo10+1
  • Filename: bpftool_5.10.120-1~bpo10+1_i386.deb
  • Size: 979
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: libc6 (>= 2.26), libcap2 (>= 1:2.10), libelf1 (>= 0.142), zlib1g (>= 1:1.2.3.3)

Applications

NameTypeArchSizeRisk
bpftool
/usr/sbin/bpftool
4324880

Vulnerabilities

NameRiskSourceFixed
CVE-2022-04940DSA
DSA-5161-1
CVE-2022-085455DSA
DSA-5161-1
CVE-2022-101291DSA
DSA-5161-1
CVE-2022-172970DSA
DSA-5161-1
CVE-2022-17860DSA
DSA-5161-1
CVE-2022-17890DSA
DSA-5161-1
CVE-2022-18520DSA
DSA-5161-1
CVE-2022-322500DSA
DSA-5161-1
CVE-2022-19720DSA
DSA-5161-1
CVE-2022-197441DSA
DSA-5161-1
CVE-2022-197555DSA
DSA-5161-1
CVE-2022-2149967DSA
DSA-5161-1
CVE-2022-2889378DSA
DSA-5161-1
CVE-2022-20780DSA
DSA-5161-1

Raw Object

{
  "sha256": "89dc6cecd260f1202587853dae17c0ff59dc00d294afca3f84081955ba9b2329",
  "sha1": "288677eb3c7a67291e2acadb6f721a580e9bcfc1",
  "md5": "eedd37ed99d197bc2cbd7f2933c85c2d",
  "type": "DEB",
  "arch": "I386",
  "name": "bpftool",
  "filename": "bpftool_5.10.120-1~bpo10+1_i386.deb",
  "size": 979,
  "description": "Inspection and simple manipulation of BPF programs and maps\nThe bpftool command allows for inspection and simple modification of\nBerkeley Packet Filter (BPF) objects on the system.",
  "url": "https://www.kernel.org/",
  "version": "5.10.120-1~bpo10+1",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "libc6 (>= 2.26), libcap2 (>= 1:2.10), libelf1 (>= 0.142), zlib1g (>= 1:1.2.3.3)",
  "applications": [
    {
      "path": "/usr/sbin/bpftool",
      "sha256": "3fda4183342c33095eba2da6b32daecb93786cb2955f877b10dc9688705c42bb",
      "sha1": "86d338d260caa4a84a1f2585c9949a6d9ac04acc",
      "md5": "a781fd3e39c6633d2310ebcd891ae326",
      "name": "bpftool",
      "size": 432488,
      "description": null,
      "package": 3794622,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-21T02:19:22+00:00",
      "updated_at": "2022-06-21T02:19:22+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-0494",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:43:54+00:00",
      "updated_at": "2022-07-27T20:43:54+00:00"
    },
    {
      "name": "CVE-2022-0854",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:44:27+00:00",
      "updated_at": "2022-07-27T20:44:27+00:00"
    },
    {
      "name": "CVE-2022-1012",
      "risk": 91,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:44:58+00:00",
      "updated_at": "2022-07-27T20:44:58+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:45:29+00:00",
      "updated_at": "2022-07-27T20:45:29+00:00"
    },
    {
      "name": "CVE-2022-1786",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:46:03+00:00",
      "updated_at": "2022-07-27T20:46:03+00:00"
    },
    {
      "name": "CVE-2022-1789",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:46:35+00:00",
      "updated_at": "2022-07-27T20:46:35+00:00"
    },
    {
      "name": "CVE-2022-1852",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:47:09+00:00",
      "updated_at": "2022-07-27T20:47:09+00:00"
    },
    {
      "name": "CVE-2022-32250",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:47:43+00:00",
      "updated_at": "2022-07-27T20:47:43+00:00"
    },
    {
      "name": "CVE-2022-1972",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:48:22+00:00",
      "updated_at": "2022-07-27T20:48:22+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:48:55+00:00",
      "updated_at": "2022-07-27T20:48:55+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:49:32+00:00",
      "updated_at": "2022-07-27T20:49:32+00:00"
    },
    {
      "name": "CVE-2022-21499",
      "risk": 67,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:50:07+00:00",
      "updated_at": "2022-07-27T20:50:07+00:00"
    },
    {
      "name": "CVE-2022-28893",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:50:38+00:00",
      "updated_at": "2022-07-27T20:50:38+00:00"
    },
    {
      "name": "CVE-2022-2078",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-09-18T15:50:52+00:00",
      "updated_at": "2022-09-18T15:50:52+00:00"
    }
  ],
  "risk": 91,
  "vulnerable": 91,
  "outdated": 91,
  "malicious": 0,
  "created_at": "2022-06-20T18:15:52+00:00",
  "updated_at": "2022-06-21T01:19:21+00:00",
  "deleted_at": null
}