Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-49802


In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix null pointer dereference in ftrace_add_mod() The @ftrace_mod is allocated by kzalloc(), so both the members {prev,next} of @ftrace_mode->list are NULL, it's not a valid state to call list_del(). If kstrdup() for @ftrace_mod->{func|module} fails, it goes to @out_free tag and calls free_ftrace_mod() to destroy @ftrace_mod, then list_del() will write prev->next and next->prev, where null pointer dereference happens. BUG: kernel NULL pointer dereference, address: 0000000000000008 Oops: 0002 [#1] PREEMPT SMP NOPTI Call Trace: <TASK> ftrace_mod_callback+0x20d/0x220 ? do_filp_open+0xd9/0x140 ftrace_process_regex.isra.51+0xbf/0x130 ftrace_regex_write.isra.52.part.53+0x6e/0x90 vfs_write+0xee/0x3a0 ? __audit_filter_op+0xb1/0x100 ? auditd_test_task+0x38/0x50 ksys_write+0xa5/0xe0 do_syscall_64+0x3a/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd Kernel panic - not syncing: Fatal exception So call INIT_LIST_HEAD() to initialize the list member to fix this issue.


Published

2025-05-01T15:16:03.510

Last Modified

2025-11-07T19:02:52.853

Status

Analyzed

Source

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Severity

CVSSv3.1: 5.5 (MEDIUM)

Weaknesses
  • Type: Primary
    CWE-476

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 4.14.300 Yes
Operating System linux linux_kernel < 4.19.267 Yes
Operating System linux linux_kernel < 5.4.225 Yes
Operating System linux linux_kernel < 5.10.156 Yes
Operating System linux linux_kernel < 5.15.80 Yes
Operating System linux linux_kernel < 6.0.10 Yes
Operating System linux linux_kernel 6.1 Yes
Operating System linux linux_kernel 6.1 Yes
Operating System linux linux_kernel 6.1 Yes
Operating System linux linux_kernel 6.1 Yes
Operating System linux linux_kernel 6.1 Yes

References