{"id":"CVE-2024-56569","summary":"ftrace: Fix regression with module command in stack_trace_filter","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix regression with module command in stack_trace_filter\n\nWhen executing the following command:\n\n    # echo \"write*:mod:ext3\" \u003e /sys/kernel/tracing/stack_trace_filter\n\nThe current mod command causes a null pointer dereference. While commit\n0f17976568b3f (\"ftrace: Fix regression with module command in stack_trace_filter\")\nhas addressed part of the issue, it left a corner case unhandled, which still\nresults in a kernel crash.","modified":"2026-03-20T12:39:51.927124Z","published":"2024-12-27T14:23:12.462Z","related":["SUSE-SU-2025:0236-1","SUSE-SU-2025:0289-1","SUSE-SU-2025:0428-1","SUSE-SU-2025:0499-1","SUSE-SU-2025:0557-1","SUSE-SU-2025:20165-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20248-1","SUSE-SU-2025:20249-1","USN-7379-2","USN-7380-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56569.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/19cacabdd5a8487ae566cbecb4d03bcb038a067e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/43ca32ce12888fb0eeb2d74dfc558dea60d3473e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/45af52e7d3b8560f21d139b3759735eead8b1653"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5dabb7af57bc72308a6e2e81a5dd756eef283803"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7ae27880de3482e063fcc1f72d9a298d0d391407"},{"type":"WEB","url":"https://git.kernel.org/stable/c/885109aa0c70639527dd6a65c82e63c9ac055e3d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8a92dc4df89c50bdb26667419ea70e0abbce456e"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56569.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-56569"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"04ec7bb642b77374b53731b795b5654b5aff1c00"},{"fixed":"43ca32ce12888fb0eeb2d74dfc558dea60d3473e"},{"fixed":"5dabb7af57bc72308a6e2e81a5dd756eef283803"},{"fixed":"885109aa0c70639527dd6a65c82e63c9ac055e3d"},{"fixed":"7ae27880de3482e063fcc1f72d9a298d0d391407"},{"fixed":"8a92dc4df89c50bdb26667419ea70e0abbce456e"},{"fixed":"19cacabdd5a8487ae566cbecb4d03bcb038a067e"},{"fixed":"45af52e7d3b8560f21d139b3759735eead8b1653"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56569.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}