CVE-2022-49875

Source
https://cve.org/CVERecord?id=CVE-2022-49875
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49875.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-49875
Downstream
Published
2025-05-01T14:10:24.427Z
Modified
2026-04-11T12:44:38.695081Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
bpftool: Fix NULL pointer dereference when pin {PROG, MAP, LINK} without FILE
Details

In the Linux kernel, the following vulnerability has been resolved:

bpftool: Fix NULL pointer dereference when pin {PROG, MAP, LINK} without FILE

When using bpftool to pin {PROG, MAP, LINK} without FILE, segmentation fault will occur. The reson is that the lack of FILE will cause strlen to trigger NULL pointer dereference. The corresponding stacktrace is shown below:

dopin dopinany dopinfd mountbpffsforpin strlen(name) <- NULL pointer dereference

Fix it by adding validation to the common process.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49875.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
75a1e792c335b5c6d7fdb1014da47aeb64c5944f
Fixed
8c80b2fca4112d724dde477aed13f7b0510a2792
Fixed
6dcdd1b68b7f9333d48d48fc77b75e7f235f6a4a
Fixed
da5161ba94c5e9182c301dd4f09c94f715c068bd
Fixed
34de8e6e0e1f66e431abf4123934a2581cb5f133

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49875.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.7.0
Fixed
5.10.155
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.79
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49875.json"