#VU104648 NULL pointer dereference in Linux kernel - CVE-2022-49228
Published: February 26, 2025 / Updated: May 11, 2025
Linux kernel
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the btf_resolve(), btf_type_needs_resolve(), btf_func_check_meta(), btf_resolve_valid() and btf_check_all_types() functions in kernel/bpf/btf.c. A local user can perform a denial of service (DoS) attack.
Remediation
External links
- https://git.kernel.org/stable/c/796d5666f6422ddadc938fb888044fcc16f2dbe3
- https://git.kernel.org/stable/c/a3bcd2110c087bc62e90fddd4a93237b049d6e68
- https://git.kernel.org/stable/c/d7e7b42f4f956f2c68ad8cda87d750093dbba737
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.19
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18