89dc6cecd260f1202587853dae17c0ff59dc00d294afca3f84081955ba9b2329
288677eb3c7a67291e2acadb6f721a580e9bcfc1
eedd37ed99d197bc2cbd7f2933c85c2d
5.10.120-1~bpo10+1
bpftool_5.10.120-1~bpo10+1_i386.deb
979
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.26), libcap2 (>= 1:2.10), libelf1 (>= 0.142), zlib1g (>= 1:1.2.3.3)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
bpftool /usr/sbin/bpftool | 432488 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-0494 | 0 | DSA DSA-5161-1 | |
CVE-2022-0854 | 55 | DSA DSA-5161-1 | |
CVE-2022-1012 | 91 | DSA DSA-5161-1 | |
CVE-2022-1729 | 70 | DSA DSA-5161-1 | |
CVE-2022-1786 | 0 | DSA DSA-5161-1 | |
CVE-2022-1789 | 0 | DSA DSA-5161-1 | |
CVE-2022-1852 | 0 | DSA DSA-5161-1 | |
CVE-2022-32250 | 0 | DSA DSA-5161-1 | |
CVE-2022-1972 | 0 | DSA DSA-5161-1 | |
CVE-2022-1974 | 41 | DSA DSA-5161-1 | |
CVE-2022-1975 | 55 | DSA DSA-5161-1 | |
CVE-2022-21499 | 67 | DSA DSA-5161-1 | |
CVE-2022-28893 | 78 | DSA DSA-5161-1 | |
CVE-2022-2078 | 0 | DSA DSA-5161-1 |
{ "sha256": "89dc6cecd260f1202587853dae17c0ff59dc00d294afca3f84081955ba9b2329", "sha1": "288677eb3c7a67291e2acadb6f721a580e9bcfc1", "md5": "eedd37ed99d197bc2cbd7f2933c85c2d", "type": "DEB", "arch": "I386", "name": "bpftool", "filename": "bpftool_5.10.120-1~bpo10+1_i386.deb", "size": 979, "description": "Inspection and simple manipulation of BPF programs and maps\nThe bpftool command allows for inspection and simple modification of\nBerkeley Packet Filter (BPF) objects on the system.", "url": "https://www.kernel.org/", "version": "5.10.120-1~bpo10+1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.26), libcap2 (>= 1:2.10), libelf1 (>= 0.142), zlib1g (>= 1:1.2.3.3)", "applications": [ { "path": "/usr/sbin/bpftool", "sha256": "3fda4183342c33095eba2da6b32daecb93786cb2955f877b10dc9688705c42bb", "sha1": "86d338d260caa4a84a1f2585c9949a6d9ac04acc", "md5": "a781fd3e39c6633d2310ebcd891ae326", "name": "bpftool", "size": 432488, "description": null, "package": 3794622, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-06-21T02:19:22+00:00", "updated_at": "2022-06-21T02:19:22+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-0494", "risk": 0, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:43:54+00:00", "updated_at": "2022-07-27T20:43:54+00:00" }, { "name": "CVE-2022-0854", "risk": 55, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:44:27+00:00", "updated_at": "2022-07-27T20:44:27+00:00" }, { "name": "CVE-2022-1012", "risk": 91, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:44:58+00:00", "updated_at": "2022-07-27T20:44:58+00:00" }, { "name": "CVE-2022-1729", "risk": 70, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:45:29+00:00", "updated_at": "2022-07-27T20:45:29+00:00" }, { "name": "CVE-2022-1786", "risk": 0, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:46:03+00:00", "updated_at": "2022-07-27T20:46:03+00:00" }, { "name": "CVE-2022-1789", "risk": 0, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:46:35+00:00", "updated_at": "2022-07-27T20:46:35+00:00" }, { "name": "CVE-2022-1852", "risk": 0, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:47:09+00:00", "updated_at": "2022-07-27T20:47:09+00:00" }, { "name": "CVE-2022-32250", "risk": 0, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:47:43+00:00", "updated_at": "2022-07-27T20:47:43+00:00" }, { "name": "CVE-2022-1972", "risk": 0, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:48:22+00:00", "updated_at": "2022-07-27T20:48:22+00:00" }, { "name": "CVE-2022-1974", "risk": 41, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:48:55+00:00", "updated_at": "2022-07-27T20:48:55+00:00" }, { "name": "CVE-2022-1975", "risk": 55, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:49:32+00:00", "updated_at": "2022-07-27T20:49:32+00:00" }, { "name": "CVE-2022-21499", "risk": 67, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:50:07+00:00", "updated_at": "2022-07-27T20:50:07+00:00" }, { "name": "CVE-2022-28893", "risk": 78, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-07-27T20:50:38+00:00", "updated_at": "2022-07-27T20:50:38+00:00" }, { "name": "CVE-2022-2078", "risk": 0, "source": "DSA", "sid": "DSA-5161-1", "fixed": null, "created_at": "2022-09-18T15:50:52+00:00", "updated_at": "2022-09-18T15:50:52+00:00" } ], "risk": 91, "vulnerable": 91, "outdated": 91, "malicious": 0, "created_at": "2022-06-20T18:15:52+00:00", "updated_at": "2022-06-21T01:19:21+00:00", "deleted_at": null }