Debian Package Tracker
Register | Log in
Subscribe

libbpf

Choose email to subscribe with

general
  • source: libbpf (main)
  • version: 1.1.0-1
  • maintainer: Sudip Mukherjee (DMD)
  • std-ver: 4.6.1.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • old-bpo: 0.3-2~bpo10+1
  • stable: 0.3-2
  • stable-bpo: 0.7.0-2~bpo11+1
  • testing: 1.1.0-1
  • unstable: 1.1.0-1
versioned links
  • 0.3-2~bpo10+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.3-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.7.0-2~bpo11+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.1.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libbpf-dev
  • libbpf1
action needed
4 low-priority security issues in bullseye low

There are 4 open security issues in bullseye.

4 issues left for the package maintainer to handle:
  • CVE-2022-3534: (needs triaging) A vulnerability classified as critical has been found in Linux Kernel. Affected is the function btf_dump_name_dups of the file tools/lib/bpf/btf_dump.c of the component libbpf. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211032.
  • CVE-2022-3606: (needs triaging) A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function find_prog_by_sec_insn of the file tools/lib/bpf/libbpf.c of the component BPF. The manipulation leads to null pointer dereference. It is recommended to apply a patch to fix this issue. The identifier VDB-211749 was assigned to this vulnerability.
  • CVE-2021-45940: (postponed; to be fixed through a stable update) libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
  • CVE-2021-45941: (postponed; to be fixed through a stable update) libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (8 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).

You can find information about how to handle these issues in the security team's documentation.

Created: 2022-07-04 Last update: 2023-01-13 18:54
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.2 instead of 4.6.1.0).
Created: 2022-12-17 Last update: 2023-01-07 05:48
news
[rss feed]
  • [2023-01-14] libbpf 1.1.0-1 MIGRATED to testing (Debian testing watch)
  • [2023-01-06] Accepted libbpf 1.1.0-1 (source) into unstable (Sudip Mukherjee)
  • [2022-11-12] libbpf 1.0.1-2 MIGRATED to testing (Debian testing watch)
  • [2022-11-06] Accepted libbpf 1.0.1-2 (source) into unstable (Sudip Mukherjee)
  • [2022-10-16] Accepted libbpf 1.0.1-1 (source) into experimental (Sudip Mukherjee)
  • [2022-06-11] libbpf 0.8.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-06-05] Accepted libbpf 0.8.0-1 (source) into unstable (Sudip Mukherjee)
  • [2022-05-10] Accepted libbpf 0.7.0-2~bpo11+1 (source) into bullseye-backports (Sudip Mukherjee)
  • [2022-03-04] libbpf 0.7.0-2 MIGRATED to testing (Debian testing watch)
  • [2022-02-26] Accepted libbpf 0.7.0-2 (source) into unstable (Sudip Mukherjee)
  • [2022-02-18] Accepted libbpf 0.7.0-1 (source) into experimental (Sudip Mukherjee)
  • [2021-12-21] Accepted libbpf 0.6.1-1 (source) into experimental (Sudip Mukherjee)
  • [2021-12-06] Accepted libbpf 0.5.0-1~bpo11+1 (source amd64) into bullseye-backports, bullseye-backports (Debian FTP Masters) (signed by: Sudip Mukherjee)
  • [2021-12-05] Accepted libbpf 0.6.0-1 (source) into experimental (Sudip Mukherjee)
  • [2021-09-23] libbpf 0.5.0-1 MIGRATED to testing (Debian testing watch)
  • [2021-09-17] Accepted libbpf 0.5.0-1 (source) into unstable (Sudip Mukherjee)
  • [2021-08-23] libbpf 0.4.0-2 MIGRATED to testing (Debian testing watch)
  • [2021-08-17] Accepted libbpf 0.4.0-2 (source) into unstable (Sudip Mukherjee)
  • [2021-05-25] Accepted libbpf 0.4.0-1 (source) into experimental (Sudip Mukherjee)
  • [2021-01-17] Accepted libbpf 0.3-2~bpo10+1 (source) into buster-backports (Sudip Mukherjee)
  • [2021-01-16] libbpf 0.3-2 MIGRATED to testing (Debian testing watch)
  • [2021-01-10] Accepted libbpf 0.3-2 (source) into unstable (Sudip Mukherjee)
  • [2021-01-09] libbpf 0.3-1 MIGRATED to testing (Debian testing watch)
  • [2021-01-03] Accepted libbpf 0.3-1 (source) into unstable (Sudip Mukherjee)
  • [2020-11-25] Accepted libbpf 0.2-1~bpo10+1 (source amd64) into buster-backports, buster-backports (Debian FTP Masters) (signed by: Sudip Mukherjee)
  • [2020-11-04] libbpf 0.2-1 MIGRATED to testing (Debian testing watch)
  • [2020-10-29] Accepted libbpf 0.2-1 (source) into unstable (Sudip Mukherjee)
  • [2020-10-02] libbpf 0.1.1-1 MIGRATED to testing (Debian testing watch)
  • [2020-09-26] Accepted libbpf 0.1.1-1 (source) into unstable (Sudip Mukherjee)
  • [2020-09-01] libbpf 0.1.0-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.1.0-1

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing