In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix null pointer dereference in ftrace_add_mod() The @ftrace_mod is allocated by kzalloc(), so both the members {prev,next} of @ftrace_mode->list are NULL, it's not a valid state to call list_del(). If kstrdup() for @ftrace_mod->{func|module} fails, it goes to @out_free tag and calls free_ftrace_mod() to destroy @ftrace_mod, then list_del() will write prev->next and next->prev, where null pointer dereference happens. BUG: kernel NULL pointer dereference, address: 0000000000000008 Oops: 0002 [#1] PREEMPT SMP NOPTI Call Trace: <TASK> ftrace_mod_callback+0x20d/0x220 ? do_filp_open+0xd9/0x140 ftrace_process_regex.isra.51+0xbf/0x130 ftrace_regex_write.isra.52.part.53+0x6e/0x90 vfs_write+0xee/0x3a0 ? __audit_filter_op+0xb1/0x100 ? auditd_test_task+0x38/0x50 ksys_write+0xa5/0xe0 do_syscall_64+0x3a/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd Kernel panic - not syncing: Fatal exception So call INIT_LIST_HEAD() to initialize the list member to fix this issue.
2025-05-01T15:16:03.510
2025-11-07T19:02:52.853
Analyzed
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSSv3.1: 5.5 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | linux | linux_kernel | < 4.14.300 | Yes |
| Operating System | linux | linux_kernel | < 4.19.267 | Yes |
| Operating System | linux | linux_kernel | < 5.4.225 | Yes |
| Operating System | linux | linux_kernel | < 5.10.156 | Yes |
| Operating System | linux | linux_kernel | < 5.15.80 | Yes |
| Operating System | linux | linux_kernel | < 6.0.10 | Yes |
| Operating System | linux | linux_kernel | 6.1 | Yes |
| Operating System | linux | linux_kernel | 6.1 | Yes |
| Operating System | linux | linux_kernel | 6.1 | Yes |
| Operating System | linux | linux_kernel | 6.1 | Yes |
| Operating System | linux | linux_kernel | 6.1 | Yes |