In the Linux kernel, the following vulnerability has been...
Moderate severity
Unreviewed
Published
May 1, 2025
to the GitHub Advisory Database
•
Updated May 7, 2025
Description
Published by the National Vulnerability Database
May 1, 2025
Published to the GitHub Advisory Database
May 1, 2025
Last updated
May 7, 2025
In the Linux kernel, the following vulnerability has been resolved:
bpftool: Fix NULL pointer dereference when pin {PROG, MAP, LINK} without FILE
When using bpftool to pin {PROG, MAP, LINK} without FILE,
segmentation fault will occur. The reson is that the lack
of FILE will cause strlen to trigger NULL pointer dereference.
The corresponding stacktrace is shown below:
do_pin
do_pin_any
do_pin_fd
mount_bpffs_for_pin
strlen(name) <- NULL pointer dereference
Fix it by adding validation to the common process.
References