libbpf 1.0.1-2ubuntu1 source package in Ubuntu
Changelog
libbpf (1.0.1-2ubuntu1) lunar; urgency=medium * SECURITY UPDATE: heap overflow vulnerability - debian/patches/CVE-2021-45940_45941.patch: Use elf_getshdrnum() instead of e_shnum - CVE-2021-45940 - CVE-2021-45941 * SECURITY UPDATE: memory leak due to argument reg_name - debian/patches/CVE-2022-3533.patch: Fix memory leak in parse_usdt_arg() - CVE-2022-3533 * SECURITY UPDATE: use-after-free vulnerability - debian/patches/CVE-2022-3534.patch: Fix use-after-free in btf_dump_name_dups - CVE-2022-3534 * SECURITY UPDATE: null pointer dereference vulnerability - debian/patches/CVE-2022-3606.patch: Fix null-pointer dereference in find_prog_by_sec_insn() - CVE-2022-3606 -- Nishit Majithia <email address hidden> Thu, 01 Dec 2022 15:29:38 +0530
Upload details
- Uploaded by:
- Nishit Majithia
- Sponsored by:
- Alex Murray
- Uploaded to:
- Lunar
- Original maintainer:
- Ubuntu Developers
- Architectures:
- linux-any
- Section:
- misc
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
libbpf_1.0.1.orig.tar.gz | 895.8 KiB | 3d6afde67682c909e341bf194678a8969f17628705af25f900d5f68bd299cb03 |
libbpf_1.0.1-2ubuntu1.debian.tar.xz | 10.6 KiB | 8818f2f9f8eb4ddbe7043cc130f15b9d1274441de63134d7b0d31f905bea7fcc |
libbpf_1.0.1-2ubuntu1.dsc | 1.6 KiB | 84dce12eae1b5a648bf65f117613b254ade2371bf43f70331337ba36db191cf6 |
Available diffs
Binary packages built by this source
- libbpf-dev: eBPF helper library (development files)
libbpf is a library for loading eBPF programs and reading and
manipulating eBPF objects from user-space.
.
This package is needed to compile programs against libbpf.
- libbpf1: eBPF helper library (shared library)
libbpf is a library for loading eBPF programs and reading and
manipulating eBPF objects from user-space.
.
This package contains the shared library.
- libbpf1-dbgsym: debug symbols for libbpf1