Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libbpf@0.3-2?distro=trixie
Typedeb
Namespacedebian
Namelibbpf
Version0.3-2
Qualifiers
distro trixie
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version0.3-2+deb11u1
Latest_non_vulnerable_version1.7.0-1
Affected_by_vulnerabilities
0
url VCID-3qxa-43jg-gfak
vulnerability_id VCID-3qxa-43jg-gfak
summary libbpf: Heap Buffer Overflow in libbpf
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-29481.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-29481.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-29481
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24693
published_at 2026-04-02T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.24464
published_at 2026-04-24T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24553
published_at 2026-04-16T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24544
published_at 2026-04-18T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24519
published_at 2026-04-21T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24732
published_at 2026-04-04T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24504
published_at 2026-04-07T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24575
published_at 2026-04-08T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24622
published_at 2026-04-09T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24638
published_at 2026-04-11T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24595
published_at 2026-04-12T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24541
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-29481
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29481
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102672
reference_id 1102672
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102672
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2358023
reference_id 2358023
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2358023
6
reference_url https://github.com/lmarch2/poc/blob/main/libbpf/libbpf.md
reference_id libbpf.md
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T15:02:03Z/
url https://github.com/lmarch2/poc/blob/main/libbpf/libbpf.md
fixed_packages
0
url pkg:deb/debian/libbpf@1.5.0-3?distro=trixie
purl pkg:deb/debian/libbpf@1.5.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.5.0-3%3Fdistro=trixie
1
url pkg:deb/debian/libbpf@1.6.3-1?distro=trixie
purl pkg:deb/debian/libbpf@1.6.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.6.3-1%3Fdistro=trixie
2
url pkg:deb/debian/libbpf@1.7.0-1?distro=trixie
purl pkg:deb/debian/libbpf@1.7.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.7.0-1%3Fdistro=trixie
aliases CVE-2025-29481
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qxa-43jg-gfak
1
url VCID-x1fv-5t74-vugy
vulnerability_id VCID-x1fv-5t74-vugy
summary
Out-of-bounds Write
libbpf has a heap-based buffer overflow (4 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45940.json
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45940.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45940
reference_id
reference_type
scores
0
value 0.00159
scoring_system epss
scoring_elements 0.3675
published_at 2026-04-01T12:55:00Z
1
value 0.00159
scoring_system epss
scoring_elements 0.36909
published_at 2026-04-02T12:55:00Z
2
value 0.00159
scoring_system epss
scoring_elements 0.36942
published_at 2026-04-04T12:55:00Z
3
value 0.00159
scoring_system epss
scoring_elements 0.36774
published_at 2026-04-07T12:55:00Z
4
value 0.00159
scoring_system epss
scoring_elements 0.36825
published_at 2026-04-08T12:55:00Z
5
value 0.00159
scoring_system epss
scoring_elements 0.3684
published_at 2026-04-09T12:55:00Z
6
value 0.00159
scoring_system epss
scoring_elements 0.36849
published_at 2026-04-11T12:55:00Z
7
value 0.00159
scoring_system epss
scoring_elements 0.36814
published_at 2026-04-12T12:55:00Z
8
value 0.00159
scoring_system epss
scoring_elements 0.36789
published_at 2026-04-13T12:55:00Z
9
value 0.00159
scoring_system epss
scoring_elements 0.36835
published_at 2026-04-16T12:55:00Z
10
value 0.00159
scoring_system epss
scoring_elements 0.36818
published_at 2026-04-18T12:55:00Z
11
value 0.00159
scoring_system epss
scoring_elements 0.36759
published_at 2026-04-21T12:55:00Z
12
value 0.00159
scoring_system epss
scoring_elements 0.36532
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45940
2
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40868
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40868
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45940
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libbpf/OSV-2021-1562.yaml
reference_id
reference_type
scores
url https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libbpf/OSV-2021-1562.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043383
reference_id 2043383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043383
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-45940
reference_id CVE-2021-45940
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-45940
8
reference_url https://usn.ubuntu.com/5759-1/
reference_id USN-5759-1
reference_type
scores
url https://usn.ubuntu.com/5759-1/
fixed_packages
0
url pkg:deb/debian/libbpf@0.7.0-2?distro=trixie
purl pkg:deb/debian/libbpf@0.7.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@0.7.0-2%3Fdistro=trixie
1
url pkg:deb/debian/libbpf@1.1.2-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libbpf@1.1.2-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qxa-43jg-gfak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.1.2-0%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/libbpf@1.5.0-3?distro=trixie
purl pkg:deb/debian/libbpf@1.5.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.5.0-3%3Fdistro=trixie
3
url pkg:deb/debian/libbpf@1.6.3-1?distro=trixie
purl pkg:deb/debian/libbpf@1.6.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.6.3-1%3Fdistro=trixie
4
url pkg:deb/debian/libbpf@1.7.0-1?distro=trixie
purl pkg:deb/debian/libbpf@1.7.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.7.0-1%3Fdistro=trixie
aliases CVE-2021-45940
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x1fv-5t74-vugy
2
url VCID-x4wf-7dmt-sfaq
vulnerability_id VCID-x4wf-7dmt-sfaq
summary
Out-of-bounds Write
libbpf has a heap-based buffer overflow (8 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45941.json
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45941.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45941
reference_id
reference_type
scores
0
value 0.00159
scoring_system epss
scoring_elements 0.3675
published_at 2026-04-01T12:55:00Z
1
value 0.00159
scoring_system epss
scoring_elements 0.36909
published_at 2026-04-02T12:55:00Z
2
value 0.00159
scoring_system epss
scoring_elements 0.36942
published_at 2026-04-04T12:55:00Z
3
value 0.00159
scoring_system epss
scoring_elements 0.36774
published_at 2026-04-07T12:55:00Z
4
value 0.00159
scoring_system epss
scoring_elements 0.36825
published_at 2026-04-08T12:55:00Z
5
value 0.00159
scoring_system epss
scoring_elements 0.3684
published_at 2026-04-09T12:55:00Z
6
value 0.00159
scoring_system epss
scoring_elements 0.36849
published_at 2026-04-11T12:55:00Z
7
value 0.00159
scoring_system epss
scoring_elements 0.36814
published_at 2026-04-12T12:55:00Z
8
value 0.00159
scoring_system epss
scoring_elements 0.36789
published_at 2026-04-13T12:55:00Z
9
value 0.00159
scoring_system epss
scoring_elements 0.36835
published_at 2026-04-16T12:55:00Z
10
value 0.00159
scoring_system epss
scoring_elements 0.36818
published_at 2026-04-18T12:55:00Z
11
value 0.00159
scoring_system epss
scoring_elements 0.36759
published_at 2026-04-21T12:55:00Z
12
value 0.00159
scoring_system epss
scoring_elements 0.36532
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45941
2
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40957
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40957
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45941
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libbpf/OSV-2021-1576.yaml
reference_id
reference_type
scores
url https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libbpf/OSV-2021-1576.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043387
reference_id 2043387
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043387
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-45941
reference_id CVE-2021-45941
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-45941
8
reference_url https://usn.ubuntu.com/5759-1/
reference_id USN-5759-1
reference_type
scores
url https://usn.ubuntu.com/5759-1/
fixed_packages
0
url pkg:deb/debian/libbpf@0.7.0-2?distro=trixie
purl pkg:deb/debian/libbpf@0.7.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@0.7.0-2%3Fdistro=trixie
1
url pkg:deb/debian/libbpf@1.1.2-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libbpf@1.1.2-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qxa-43jg-gfak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.1.2-0%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/libbpf@1.5.0-3?distro=trixie
purl pkg:deb/debian/libbpf@1.5.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.5.0-3%3Fdistro=trixie
3
url pkg:deb/debian/libbpf@1.6.3-1?distro=trixie
purl pkg:deb/debian/libbpf@1.6.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.6.3-1%3Fdistro=trixie
4
url pkg:deb/debian/libbpf@1.7.0-1?distro=trixie
purl pkg:deb/debian/libbpf@1.7.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.7.0-1%3Fdistro=trixie
aliases CVE-2021-45941
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x4wf-7dmt-sfaq
Fixing_vulnerabilities
0
url VCID-4gdy-gqe4-93f4
vulnerability_id VCID-4gdy-gqe4-93f4
summary Kernel: use-after-free in btf_dump_name_dups in tools/lib/bpf/btf_dump.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3534.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3534.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3534
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08521
published_at 2026-04-24T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08526
published_at 2026-04-21T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09364
published_at 2026-04-11T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09212
published_at 2026-04-18T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.0931
published_at 2026-04-08T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09353
published_at 2026-04-09T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09336
published_at 2026-04-12T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09269
published_at 2026-04-02T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09213
published_at 2026-04-16T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09322
published_at 2026-04-13T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.0932
published_at 2026-04-04T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09235
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3534
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3534
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717
reference_id 1023717
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165706
reference_id 2165706
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165706
6
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
7
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
8
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
9
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
10
reference_url https://vuldb.com/?id.211032
reference_id ?id.211032
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:09:09Z/
url https://vuldb.com/?id.211032
11
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93c660ca40b5d2f7c1b1626e955a8e9fa30e0749
reference_id ?id=93c660ca40b5d2f7c1b1626e955a8e9fa30e0749
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:09:09Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93c660ca40b5d2f7c1b1626e955a8e9fa30e0749
12
reference_url https://usn.ubuntu.com/5759-1/
reference_id USN-5759-1
reference_type
scores
url https://usn.ubuntu.com/5759-1/
13
reference_url https://usn.ubuntu.com/6215-1/
reference_id USN-6215-1
reference_type
scores
url https://usn.ubuntu.com/6215-1/
14
reference_url https://usn.ubuntu.com/USN-5759-2/
reference_id USN-USN-5759-2
reference_type
scores
url https://usn.ubuntu.com/USN-5759-2/
fixed_packages
0
url pkg:deb/debian/libbpf@0.3-2?distro=trixie
purl pkg:deb/debian/libbpf@0.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qxa-43jg-gfak
1
vulnerability VCID-x1fv-5t74-vugy
2
vulnerability VCID-x4wf-7dmt-sfaq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@0.3-2%3Fdistro=trixie
1
url pkg:deb/debian/libbpf@0.3-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libbpf@0.3-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@0.3-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libbpf@1.1.0-1?distro=trixie
purl pkg:deb/debian/libbpf@1.1.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.1.0-1%3Fdistro=trixie
3
url pkg:deb/debian/libbpf@1.1.2-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libbpf@1.1.2-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qxa-43jg-gfak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.1.2-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/libbpf@1.5.0-3?distro=trixie
purl pkg:deb/debian/libbpf@1.5.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.5.0-3%3Fdistro=trixie
5
url pkg:deb/debian/libbpf@1.6.3-1?distro=trixie
purl pkg:deb/debian/libbpf@1.6.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.6.3-1%3Fdistro=trixie
6
url pkg:deb/debian/libbpf@1.7.0-1?distro=trixie
purl pkg:deb/debian/libbpf@1.7.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.7.0-1%3Fdistro=trixie
aliases CVE-2022-3534
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4gdy-gqe4-93f4
1
url VCID-gudk-drsz-vfhw
vulnerability_id VCID-gudk-drsz-vfhw
summary Kernel: memory lean in parse_usdt_arg in tools/lib/bpf/usdt.c in BPF
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3533.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3533.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3533
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08885
published_at 2026-04-11T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08887
published_at 2026-04-09T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08854
published_at 2026-04-12T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.0884
published_at 2026-04-13T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08727
published_at 2026-04-16T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08703
published_at 2026-04-18T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08783
published_at 2026-04-07T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08861
published_at 2026-04-08T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09087
published_at 2026-04-02T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.0914
published_at 2026-04-04T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09157
published_at 2026-04-21T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.092
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3533
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717
reference_id 1023717
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165625
reference_id 2165625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165625
5
reference_url https://usn.ubuntu.com/5759-1/
reference_id USN-5759-1
reference_type
scores
url https://usn.ubuntu.com/5759-1/
fixed_packages
0
url pkg:deb/debian/libbpf@0?distro=trixie
purl pkg:deb/debian/libbpf@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@0%3Fdistro=trixie
1
url pkg:deb/debian/libbpf@0.3-2?distro=trixie
purl pkg:deb/debian/libbpf@0.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qxa-43jg-gfak
1
vulnerability VCID-x1fv-5t74-vugy
2
vulnerability VCID-x4wf-7dmt-sfaq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@0.3-2%3Fdistro=trixie
2
url pkg:deb/debian/libbpf@1.1.0-1?distro=trixie
purl pkg:deb/debian/libbpf@1.1.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.1.0-1%3Fdistro=trixie
3
url pkg:deb/debian/libbpf@1.1.2-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libbpf@1.1.2-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qxa-43jg-gfak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.1.2-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/libbpf@1.5.0-3?distro=trixie
purl pkg:deb/debian/libbpf@1.5.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.5.0-3%3Fdistro=trixie
5
url pkg:deb/debian/libbpf@1.6.3-1?distro=trixie
purl pkg:deb/debian/libbpf@1.6.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.6.3-1%3Fdistro=trixie
6
url pkg:deb/debian/libbpf@1.7.0-1?distro=trixie
purl pkg:deb/debian/libbpf@1.7.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.7.0-1%3Fdistro=trixie
aliases CVE-2022-3533
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gudk-drsz-vfhw
2
url VCID-vu3z-hmu8-fkbn
vulnerability_id VCID-vu3z-hmu8-fkbn
summary kernel: libbpf: NULL pointer dereference in find_prog_by_sec_insn
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3606.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3606.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3606
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05311
published_at 2026-04-24T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.04988
published_at 2026-04-07T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05021
published_at 2026-04-08T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05037
published_at 2026-04-09T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05018
published_at 2026-04-11T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.04999
published_at 2026-04-12T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.0498
published_at 2026-04-13T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.04926
published_at 2026-04-16T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.04936
published_at 2026-04-18T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05274
published_at 2026-04-21T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05137
published_at 2026-04-02T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.05163
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3606
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3606
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717
reference_id 1023717
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2155196
reference_id 2155196
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2155196
6
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
7
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
8
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
9
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
10
reference_url https://vuldb.com/?id.211749
reference_id ?id.211749
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:19Z/
url https://vuldb.com/?id.211749
11
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=d0d382f95a9270dcf803539d6781d6bd67e3f5b2
reference_id ?id=d0d382f95a9270dcf803539d6781d6bd67e3f5b2
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:19Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=d0d382f95a9270dcf803539d6781d6bd67e3f5b2
12
reference_url https://usn.ubuntu.com/5759-1/
reference_id USN-5759-1
reference_type
scores
url https://usn.ubuntu.com/5759-1/
13
reference_url https://usn.ubuntu.com/6215-1/
reference_id USN-6215-1
reference_type
scores
url https://usn.ubuntu.com/6215-1/
14
reference_url https://usn.ubuntu.com/USN-5759-2/
reference_id USN-USN-5759-2
reference_type
scores
url https://usn.ubuntu.com/USN-5759-2/
fixed_packages
0
url pkg:deb/debian/libbpf@0.3-2?distro=trixie
purl pkg:deb/debian/libbpf@0.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qxa-43jg-gfak
1
vulnerability VCID-x1fv-5t74-vugy
2
vulnerability VCID-x4wf-7dmt-sfaq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@0.3-2%3Fdistro=trixie
1
url pkg:deb/debian/libbpf@0.3-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libbpf@0.3-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@0.3-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libbpf@1.1.0-1?distro=trixie
purl pkg:deb/debian/libbpf@1.1.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.1.0-1%3Fdistro=trixie
3
url pkg:deb/debian/libbpf@1.1.2-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libbpf@1.1.2-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qxa-43jg-gfak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.1.2-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/libbpf@1.5.0-3?distro=trixie
purl pkg:deb/debian/libbpf@1.5.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.5.0-3%3Fdistro=trixie
5
url pkg:deb/debian/libbpf@1.6.3-1?distro=trixie
purl pkg:deb/debian/libbpf@1.6.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.6.3-1%3Fdistro=trixie
6
url pkg:deb/debian/libbpf@1.7.0-1?distro=trixie
purl pkg:deb/debian/libbpf@1.7.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.7.0-1%3Fdistro=trixie
aliases CVE-2022-3606
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vu3z-hmu8-fkbn
Risk_score3.3
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@0.3-2%3Fdistro=trixie