SB20250226466 - NULL pointer dereference in Linux kernel bpf
Published: February 26, 2025 Updated: May 11, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2022-49228)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the btf_resolve(), btf_type_needs_resolve(), btf_func_check_meta(), btf_resolve_valid() and btf_check_all_types() functions in kernel/bpf/btf.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/796d5666f6422ddadc938fb888044fcc16f2dbe3
- https://git.kernel.org/stable/c/a3bcd2110c087bc62e90fddd4a93237b049d6e68
- https://git.kernel.org/stable/c/d7e7b42f4f956f2c68ad8cda87d750093dbba737
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.19
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18