Total vulnerabilities in the database
In the Linux kernel, the following vulnerability has been resolved:
bpftool: Fix NULL pointer dereference when pin {PROG, MAP, LINK} without FILE
When using bpftool to pin {PROG, MAP, LINK} without FILE, segmentation fault will occur. The reson is that the lack of FILE will cause strlen to trigger NULL pointer dereference. The corresponding stacktrace is shown below:
do_pin do_pin_any do_pin_fd mount_bpffs_for_pin strlen(name) <- NULL pointer dereference
Fix it by adding validation to the common process.
Software | From | Fixed in |
---|---|---|
linux / linux_kernel | 6.1-rc2 | 6.1-rc2.x |
linux / linux_kernel | 6.1-rc1 | 6.1-rc1.x |
linux / linux_kernel | 6.1-rc3 | 6.1-rc3.x |
linux / linux_kernel | 6.1-rc4 | 6.1-rc4.x |
linux / linux_kernel | 5.11 | 5.15.79 |
linux / linux_kernel | 5.16 | 6.0.9 |
linux / linux_kernel | 5.7 | 5.10.155 |