Debian Package Tracker
Register | Log in
Subscribe

libbpf

Choose email to subscribe with

general
  • source: libbpf (main)
  • version: 0.7.0-2
  • maintainer: Sudip Mukherjee (DMD)
  • std-ver: 4.6.0.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • old-bpo: 0.3-2~bpo10+1
  • stable: 0.3-2
  • stable-bpo: 0.7.0-2~bpo11+1
  • testing: 0.7.0-2
  • unstable: 0.7.0-2
versioned links
  • 0.3-2~bpo10+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.3-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.7.0-2~bpo11+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.7.0-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libbpf-dev
  • libbpf0
action needed
A new upstream version is available: 0.8.0 high
A new upstream version 0.8.0 is available, you should consider packaging it.
Created: 2022-05-18 Last update: 2022-05-22 04:32
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2021-45940: libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
  • CVE-2021-45941: libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (8 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
Created: 2022-01-01 Last update: 2022-03-04 05:34
2 security issues in bullseye high

There are 2 open security issues in bullseye.

2 important issues:
  • CVE-2021-45940: libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
  • CVE-2021-45941: libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (8 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
Created: 2022-01-01 Last update: 2022-03-04 05:34
2 security issues in bookworm high

There are 2 open security issues in bookworm.

2 important issues:
  • CVE-2021-45940: libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
  • CVE-2021-45941: libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (8 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
Created: 2022-01-01 Last update: 2022-03-04 05:34
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.6.0.1).
Created: 2022-05-11 Last update: 2022-05-11 23:24
news
[rss feed]
  • [2022-05-10] Accepted libbpf 0.7.0-2~bpo11+1 (source) into bullseye-backports (Sudip Mukherjee)
  • [2022-03-04] libbpf 0.7.0-2 MIGRATED to testing (Debian testing watch)
  • [2022-02-26] Accepted libbpf 0.7.0-2 (source) into unstable (Sudip Mukherjee)
  • [2022-02-18] Accepted libbpf 0.7.0-1 (source) into experimental (Sudip Mukherjee)
  • [2021-12-21] Accepted libbpf 0.6.1-1 (source) into experimental (Sudip Mukherjee)
  • [2021-12-06] Accepted libbpf 0.5.0-1~bpo11+1 (source amd64) into bullseye-backports, bullseye-backports (Debian FTP Masters) (signed by: Sudip Mukherjee)
  • [2021-12-05] Accepted libbpf 0.6.0-1 (source) into experimental (Sudip Mukherjee)
  • [2021-09-23] libbpf 0.5.0-1 MIGRATED to testing (Debian testing watch)
  • [2021-09-17] Accepted libbpf 0.5.0-1 (source) into unstable (Sudip Mukherjee)
  • [2021-08-23] libbpf 0.4.0-2 MIGRATED to testing (Debian testing watch)
  • [2021-08-17] Accepted libbpf 0.4.0-2 (source) into unstable (Sudip Mukherjee)
  • [2021-05-25] Accepted libbpf 0.4.0-1 (source) into experimental (Sudip Mukherjee)
  • [2021-01-17] Accepted libbpf 0.3-2~bpo10+1 (source) into buster-backports (Sudip Mukherjee)
  • [2021-01-16] libbpf 0.3-2 MIGRATED to testing (Debian testing watch)
  • [2021-01-10] Accepted libbpf 0.3-2 (source) into unstable (Sudip Mukherjee)
  • [2021-01-09] libbpf 0.3-1 MIGRATED to testing (Debian testing watch)
  • [2021-01-03] Accepted libbpf 0.3-1 (source) into unstable (Sudip Mukherjee)
  • [2020-11-25] Accepted libbpf 0.2-1~bpo10+1 (source amd64) into buster-backports, buster-backports (Debian FTP Masters) (signed by: Sudip Mukherjee)
  • [2020-11-04] libbpf 0.2-1 MIGRATED to testing (Debian testing watch)
  • [2020-10-29] Accepted libbpf 0.2-1 (source) into unstable (Sudip Mukherjee)
  • [2020-10-02] libbpf 0.1.1-1 MIGRATED to testing (Debian testing watch)
  • [2020-09-26] Accepted libbpf 0.1.1-1 (source) into unstable (Sudip Mukherjee)
  • [2020-09-01] libbpf 0.1.0-1 MIGRATED to testing (Debian testing watch)
  • [2020-09-01] libbpf 0.1.0-1 MIGRATED to testing (Debian testing watch)
  • [2020-08-26] Accepted libbpf 0.1.0-1 (source) into unstable (Sudip Mukherjee)
  • [2020-07-29] libbpf 0.0.9-1 MIGRATED to testing (Debian testing watch)
  • [2020-07-23] Accepted libbpf 0.0.9-1 (source) into unstable (Sudip Mukherjee)
  • [2020-05-06] libbpf 0.0.8-1 MIGRATED to testing (Debian testing watch)
  • [2020-05-01] Accepted libbpf 0.0.8-1 (source) into unstable (Sudip Mukherjee)
  • [2020-04-15] libbpf 0.0.6-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • lintian
  • buildd: logs, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.7.0-2

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing