{"id":"CVE-2022-49802","summary":"ftrace: Fix null pointer dereference in ftrace_add_mod()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix null pointer dereference in ftrace_add_mod()\n\nThe @ftrace_mod is allocated by kzalloc(), so both the members {prev,next}\nof @ftrace_mode-\u003elist are NULL, it's not a valid state to call list_del().\nIf kstrdup() for @ftrace_mod-\u003e{func|module} fails, it goes to @out_free\ntag and calls free_ftrace_mod() to destroy @ftrace_mod, then list_del()\nwill write prev-\u003enext and next-\u003eprev, where null pointer dereference\nhappens.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000008\nOops: 0002 [#1] PREEMPT SMP NOPTI\nCall Trace:\n \u003cTASK\u003e\n ftrace_mod_callback+0x20d/0x220\n ? do_filp_open+0xd9/0x140\n ftrace_process_regex.isra.51+0xbf/0x130\n ftrace_regex_write.isra.52.part.53+0x6e/0x90\n vfs_write+0xee/0x3a0\n ? __audit_filter_op+0xb1/0x100\n ? auditd_test_task+0x38/0x50\n ksys_write+0xa5/0xe0\n do_syscall_64+0x3a/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\nKernel panic - not syncing: Fatal exception\n\nSo call INIT_LIST_HEAD() to initialize the list member to fix this issue.","modified":"2026-04-03T13:14:40.863378136Z","published":"2025-05-01T14:09:30.308Z","related":["SUSE-SU-2025:01918-1","SUSE-SU-2025:01966-1","SUSE-SU-2025:01982-1","SUSE-SU-2025:01995-1","SUSE-SU-2025:02173-1","SUSE-SU-2025:02262-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49802.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/19ba6c8af9382c4c05dc6a0a79af3013b9a35cd0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1bea037a1abb23a6729bef36a2265a4565f5ea77"},{"type":"WEB","url":"https://git.kernel.org/stable/c/665b4c6648bf2b91f69b33817f4321cf4c3cafe9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6a14828caddad0d989495a72af678adf60992704"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6e50eb4b1807017f6c2d5089064256ce2de8aef1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b5bfc61f541d3f092b13dedcfe000d86eb8e133c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f715f31559b82e3f75ce047fa476de63d8107584"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49802.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49802"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"673feb9d76ab3eddde7acfd94b206e321cfc90b9"},{"fixed":"665b4c6648bf2b91f69b33817f4321cf4c3cafe9"},{"fixed":"b5bfc61f541d3f092b13dedcfe000d86eb8e133c"},{"fixed":"f715f31559b82e3f75ce047fa476de63d8107584"},{"fixed":"6a14828caddad0d989495a72af678adf60992704"},{"fixed":"1bea037a1abb23a6729bef36a2265a4565f5ea77"},{"fixed":"6e50eb4b1807017f6c2d5089064256ce2de8aef1"},{"fixed":"19ba6c8af9382c4c05dc6a0a79af3013b9a35cd0"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-49802.json"}}],"schema_version":"1.7.5"}