97f262a4c7b770b15d802cd40fb0d7ff4d6097b5c1a139d53edef388e74b48af
a0a6caa8736bbc8764e5fd854b51f0b343447cee
32a31df4aa60c0afe5f76b34d035ddb5
5.10.127-1
bpftool_5.10.127-1_amd64.deb
956
DEB
linux
AMD64
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
libc6 (>= 2.26), libcap2 (>= 1:2.10), libelf1 (>= 0.142), zlib1g (>= 1:1.2.3.3)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
bpftool /usr/sbin/bpftool | 392936 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2021-33655 | 78 | DSA DSA-5191-1 | |
CVE-2022-2318 | 0 | DSA DSA-5191-1 | |
CVE-2022-26365 | 0 | DSA DSA-5191-1 | |
CVE-2022-33740 | 0 | DSA DSA-5191-1 | |
CVE-2022-33741 | 0 | DSA DSA-5191-1 | |
CVE-2022-33742 | 0 | DSA DSA-5191-1 | |
CVE-2022-33743 | 0 | DSA DSA-5191-1 | |
CVE-2022-33744 | 0 | DSA DSA-5191-1 | |
CVE-2022-34918 | 0 | DSA DSA-5191-1 |
{ "sha256": "97f262a4c7b770b15d802cd40fb0d7ff4d6097b5c1a139d53edef388e74b48af", "sha1": "a0a6caa8736bbc8764e5fd854b51f0b343447cee", "md5": "32a31df4aa60c0afe5f76b34d035ddb5", "type": "DEB", "arch": "AMD64", "name": "bpftool", "filename": "bpftool_5.10.127-1_amd64.deb", "size": 956, "description": "Inspection and simple manipulation of BPF programs and maps\nThe bpftool command allows for inspection and simple modification of\nBerkeley Packet Filter (BPF) objects on the system.", "url": "https://www.kernel.org/", "version": "5.10.127-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "libc6 (>= 2.26), libcap2 (>= 1:2.10), libelf1 (>= 0.142), zlib1g (>= 1:1.2.3.3)", "applications": [ { "path": "/usr/sbin/bpftool", "sha256": "8498d4a860cd94bf76df3bc22a191eb969f747cc9b313048bcd72dc6e08a97f7", "sha1": "e2b49e77d2e1f205cce99b7e27f612384ac4a9b6", "md5": "be22b24a9f20eff5cd5d51bad40e7d89", "name": "bpftool", "size": 392936, "description": null, "package": 3818276, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-02T02:55:38+00:00", "updated_at": "2022-07-02T02:55:38+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2021-33655", "risk": 78, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:15:43+00:00", "updated_at": "2022-07-27T20:15:43+00:00" }, { "name": "CVE-2022-2318", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:16:16+00:00", "updated_at": "2022-07-27T20:16:16+00:00" }, { "name": "CVE-2022-26365", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:16:49+00:00", "updated_at": "2022-07-27T20:16:49+00:00" }, { "name": "CVE-2022-33740", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:17:21+00:00", "updated_at": "2022-07-27T20:17:21+00:00" }, { "name": "CVE-2022-33741", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:17:54+00:00", "updated_at": "2022-07-27T20:17:54+00:00" }, { "name": "CVE-2022-33742", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:18:24+00:00", "updated_at": "2022-07-27T20:18:24+00:00" }, { "name": "CVE-2022-33743", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:18:55+00:00", "updated_at": "2022-07-27T20:18:55+00:00" }, { "name": "CVE-2022-33744", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:19:26+00:00", "updated_at": "2022-07-27T20:19:26+00:00" }, { "name": "CVE-2022-34918", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:19:57+00:00", "updated_at": "2022-07-27T20:19:57+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-07-01T07:14:06+00:00", "updated_at": "2022-07-02T01:55:38+00:00", "deleted_at": null }