CVE-2022-49802
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
01/05/2025
Last modified:
07/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ftrace: Fix null pointer dereference in ftrace_add_mod()<br />
<br />
The @ftrace_mod is allocated by kzalloc(), so both the members {prev,next}<br />
of @ftrace_mode->list are NULL, it&#39;s not a valid state to call list_del().<br />
If kstrdup() for @ftrace_mod->{func|module} fails, it goes to @out_free<br />
tag and calls free_ftrace_mod() to destroy @ftrace_mod, then list_del()<br />
will write prev->next and next->prev, where null pointer dereference<br />
happens.<br />
<br />
BUG: kernel NULL pointer dereference, address: 0000000000000008<br />
Oops: 0002 [#1] PREEMPT SMP NOPTI<br />
Call Trace:<br />
<br />
ftrace_mod_callback+0x20d/0x220<br />
? do_filp_open+0xd9/0x140<br />
ftrace_process_regex.isra.51+0xbf/0x130<br />
ftrace_regex_write.isra.52.part.53+0x6e/0x90<br />
vfs_write+0xee/0x3a0<br />
? __audit_filter_op+0xb1/0x100<br />
? auditd_test_task+0x38/0x50<br />
ksys_write+0xa5/0xe0<br />
do_syscall_64+0x3a/0x90<br />
entry_SYSCALL_64_after_hwframe+0x63/0xcd<br />
Kernel panic - not syncing: Fatal exception<br />
<br />
So call INIT_LIST_HEAD() to initialize the list member to fix this issue.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.13 (including) | 4.14.300 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.267 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.225 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.156 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.80 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.0.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/19ba6c8af9382c4c05dc6a0a79af3013b9a35cd0
- https://git.kernel.org/stable/c/1bea037a1abb23a6729bef36a2265a4565f5ea77
- https://git.kernel.org/stable/c/665b4c6648bf2b91f69b33817f4321cf4c3cafe9
- https://git.kernel.org/stable/c/6a14828caddad0d989495a72af678adf60992704
- https://git.kernel.org/stable/c/6e50eb4b1807017f6c2d5089064256ce2de8aef1
- https://git.kernel.org/stable/c/b5bfc61f541d3f092b13dedcfe000d86eb8e133c
- https://git.kernel.org/stable/c/f715f31559b82e3f75ce047fa476de63d8107584



