We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49875

bpftool: Fix NULL pointer dereference when pin {PROG, MAP, LINK} without FILE



Description

In the Linux kernel, the following vulnerability has been resolved: bpftool: Fix NULL pointer dereference when pin {PROG, MAP, LINK} without FILE When using bpftool to pin {PROG, MAP, LINK} without FILE, segmentation fault will occur. The reson is that the lack of FILE will cause strlen to trigger NULL pointer dereference. The corresponding stacktrace is shown below: do_pin do_pin_any do_pin_fd mount_bpffs_for_pin strlen(name) <- NULL pointer dereference Fix it by adding validation to the common process.

Reserved 2025-05-01 | Published 2025-05-01 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

75a1e792c335b5c6d7fdb1014da47aeb64c5944f before 8c80b2fca4112d724dde477aed13f7b0510a2792
affected

75a1e792c335b5c6d7fdb1014da47aeb64c5944f before 6dcdd1b68b7f9333d48d48fc77b75e7f235f6a4a
affected

75a1e792c335b5c6d7fdb1014da47aeb64c5944f before da5161ba94c5e9182c301dd4f09c94f715c068bd
affected

75a1e792c335b5c6d7fdb1014da47aeb64c5944f before 34de8e6e0e1f66e431abf4123934a2581cb5f133
affected

Default status
affected

5.7
affected

Any version before 5.7
unaffected

5.10.155
unaffected

5.15.79
unaffected

6.0.9
unaffected

6.1
unaffected

References

git.kernel.org/...c/8c80b2fca4112d724dde477aed13f7b0510a2792

git.kernel.org/...c/6dcdd1b68b7f9333d48d48fc77b75e7f235f6a4a

git.kernel.org/...c/da5161ba94c5e9182c301dd4f09c94f715c068bd

git.kernel.org/...c/34de8e6e0e1f66e431abf4123934a2581cb5f133

cve.org (CVE-2022-49875)

nvd.nist.gov (CVE-2022-49875)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49875

Support options

Helpdesk Chat, Email, Knowledgebase