{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-49802","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-05-01T14:05:17.225Z","datePublished":"2025-05-01T14:09:30.308Z","dateUpdated":"2026-05-11T19:07:04.562Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:07:04.562Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix null pointer dereference in ftrace_add_mod()\n\nThe @ftrace_mod is allocated by kzalloc(), so both the members {prev,next}\nof @ftrace_mode->list are NULL, it's not a valid state to call list_del().\nIf kstrdup() for @ftrace_mod->{func|module} fails, it goes to @out_free\ntag and calls free_ftrace_mod() to destroy @ftrace_mod, then list_del()\nwill write prev->next and next->prev, where null pointer dereference\nhappens.\n\nBUG: kernel NULL pointer dereference, address: 0000000000000008\nOops: 0002 [#1] PREEMPT SMP NOPTI\nCall Trace:\n <TASK>\n ftrace_mod_callback+0x20d/0x220\n ? do_filp_open+0xd9/0x140\n ftrace_process_regex.isra.51+0xbf/0x130\n ftrace_regex_write.isra.52.part.53+0x6e/0x90\n vfs_write+0xee/0x3a0\n ? __audit_filter_op+0xb1/0x100\n ? auditd_test_task+0x38/0x50\n ksys_write+0xa5/0xe0\n do_syscall_64+0x3a/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\nKernel panic - not syncing: Fatal exception\n\nSo call INIT_LIST_HEAD() to initialize the list member to fix this issue."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/trace/ftrace.c"],"versions":[{"version":"673feb9d76ab3eddde7acfd94b206e321cfc90b9","lessThan":"665b4c6648bf2b91f69b33817f4321cf4c3cafe9","status":"affected","versionType":"git"},{"version":"673feb9d76ab3eddde7acfd94b206e321cfc90b9","lessThan":"b5bfc61f541d3f092b13dedcfe000d86eb8e133c","status":"affected","versionType":"git"},{"version":"673feb9d76ab3eddde7acfd94b206e321cfc90b9","lessThan":"f715f31559b82e3f75ce047fa476de63d8107584","status":"affected","versionType":"git"},{"version":"673feb9d76ab3eddde7acfd94b206e321cfc90b9","lessThan":"6a14828caddad0d989495a72af678adf60992704","status":"affected","versionType":"git"},{"version":"673feb9d76ab3eddde7acfd94b206e321cfc90b9","lessThan":"1bea037a1abb23a6729bef36a2265a4565f5ea77","status":"affected","versionType":"git"},{"version":"673feb9d76ab3eddde7acfd94b206e321cfc90b9","lessThan":"6e50eb4b1807017f6c2d5089064256ce2de8aef1","status":"affected","versionType":"git"},{"version":"673feb9d76ab3eddde7acfd94b206e321cfc90b9","lessThan":"19ba6c8af9382c4c05dc6a0a79af3013b9a35cd0","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/trace/ftrace.c"],"versions":[{"version":"4.13","status":"affected"},{"version":"0","lessThan":"4.13","status":"unaffected","versionType":"semver"},{"version":"4.14.300","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.267","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.225","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.156","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.80","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.0.10","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.13","versionEndExcluding":"4.14.300"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.13","versionEndExcluding":"4.19.267"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.13","versionEndExcluding":"5.4.225"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.13","versionEndExcluding":"5.10.156"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.13","versionEndExcluding":"5.15.80"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.13","versionEndExcluding":"6.0.10"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.13","versionEndExcluding":"6.1"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/665b4c6648bf2b91f69b33817f4321cf4c3cafe9"},{"url":"https://git.kernel.org/stable/c/b5bfc61f541d3f092b13dedcfe000d86eb8e133c"},{"url":"https://git.kernel.org/stable/c/f715f31559b82e3f75ce047fa476de63d8107584"},{"url":"https://git.kernel.org/stable/c/6a14828caddad0d989495a72af678adf60992704"},{"url":"https://git.kernel.org/stable/c/1bea037a1abb23a6729bef36a2265a4565f5ea77"},{"url":"https://git.kernel.org/stable/c/6e50eb4b1807017f6c2d5089064256ce2de8aef1"},{"url":"https://git.kernel.org/stable/c/19ba6c8af9382c4c05dc6a0a79af3013b9a35cd0"}],"title":"ftrace: Fix null pointer dereference in ftrace_add_mod()","x_generator":{"engine":"bippy-1.2.0"}}}}