
Cloud Vulnerability DB
A community-led vulnerabilities database
A NULL pointer dereference vulnerability (CVE-2022-49875) was identified in the Linux kernel's bpftool component. The vulnerability was discovered when using bpftool to pin {PROG, MAP, LINK} operations without a FILE parameter, which causes a segmentation fault due to strlen triggering a NULL pointer dereference (NVD).
The vulnerability occurs in a specific call stack sequence: dopin -> dopinany -> dopinfd -> mountbpffsforpin -> strlen(name), where the strlen function encounters a NULL pointer dereference. The issue has been assigned a CVSS v3.1 Base Score of 5.5 (MEDIUM) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating local access requirements and high impact on availability (NVD).
When exploited, this vulnerability results in a segmentation fault in the bpftool utility, which can lead to system instability or crashes. The vulnerability affects multiple versions of the Linux kernel, including versions from 5.11 up to 5.15.79 and from 5.16 up to 6.0.9 (NVD).
The vulnerability has been resolved by adding validation to the common process in the bpftool implementation. Users are advised to update their Linux kernel to a patched version that includes this fix (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."