CVE-2022-49802: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix null pointer dereference in ftrace_add_mod() The @ftrace_mod is allocated by kzalloc(), so both the members {prev,next} of @ftrace_mode->list are NULL, it's not a valid state to call list_del(). If kstrdup() for @ftrace_mod->{func|module} fails, it goes to @out_free tag and calls free_ftrace_mod() to destroy @ftrace_mod, then list_del() will write prev->next and next->prev, where null pointer dereference happens. BUG: kernel NULL pointer dereference, address: 0000000000000008 Oops: 0002 [#1] PREEMPT SMP NOPTI Call Trace: <TASK> ftrace_mod_callback+0x20d/0x220 ? do_filp_open+0xd9/0x140 ftrace_process_regex.isra.51+0xbf/0x130 ftrace_regex_write.isra.52.part.53+0x6e/0x90 vfs_write+0xee/0x3a0 ? __audit_filter_op+0xb1/0x100 ? auditd_test_task+0x38/0x50 ksys_write+0xa5/0xe0 do_syscall_64+0x3a/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd Kernel panic - not syncing: Fatal exception So call INIT_LIST_HEAD() to initialize the list member to fix this issue.
AI Analysis
Technical Summary
CVE-2022-49802 is a vulnerability in the Linux kernel's ftrace subsystem, specifically within the ftrace_add_mod() function. The issue arises because the ftrace_mod structure is allocated using kzalloc(), which zeroes memory, resulting in the prev and next pointers of the ftrace_mod->list member being NULL initially. When kstrdup() fails to allocate memory for the func or module members of ftrace_mod, the code jumps to an error handling label that calls free_ftrace_mod() to destroy the ftrace_mod instance. However, after this, list_del() is called on the list member without proper initialization, leading to a null pointer dereference since prev and next pointers are NULL. This causes a kernel NULL pointer dereference at address 0x8, triggering a kernel panic and system crash. The root cause is the missing call to INIT_LIST_HEAD() to properly initialize the list pointers before list_del() is invoked. This vulnerability can be triggered by writing to the ftrace_regex interface, as indicated by the call trace involving ftrace_regex_write and related functions. Exploiting this bug results in a denial of service (DoS) due to kernel panic and system unavailability. The vulnerability affects Linux kernel versions identified by the commit hash 673feb9d76ab3eddde7acfd94b206e321cfc90b9 and likely other related versions. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The fix involves adding INIT_LIST_HEAD() to properly initialize the list member to prevent null pointer dereference during error handling.
Potential Impact
For European organizations relying on Linux-based systems, this vulnerability poses a risk of denial of service through kernel panics triggered by malformed inputs to the ftrace subsystem. Systems running affected kernel versions could be crashed remotely or locally if an attacker has the ability to write to the ftrace_regex interface or otherwise trigger the vulnerable code path. This could disrupt critical services, especially in environments where Linux is used for servers, networking equipment, or embedded devices. The impact is primarily availability loss, causing downtime and potential operational disruption. Confidentiality and integrity impacts are not evident from this vulnerability alone. However, repeated crashes could lead to system instability and increased maintenance overhead. Organizations in sectors such as finance, telecommunications, healthcare, and critical infrastructure in Europe, which heavily depend on Linux servers, could face operational risks if unpatched. The lack of known exploits reduces immediate threat but does not eliminate risk, especially as attackers may develop exploits once the vulnerability is public.
Mitigation Recommendations
European organizations should prioritize patching affected Linux kernel versions by applying vendor-provided updates that include the fix for CVE-2022-49802. If immediate patching is not possible, restricting access to the ftrace interfaces, particularly ftrace_regex, can reduce exposure. This can be achieved by limiting permissions to trusted users and processes, and by using kernel lockdown features or mandatory access controls (e.g., SELinux, AppArmor) to prevent unauthorized writes to ftrace controls. Monitoring kernel logs for OOPS or panic messages related to ftrace can help detect exploitation attempts. Additionally, organizations should implement robust system integrity monitoring and maintain backups to enable rapid recovery from crashes. For embedded or specialized Linux systems, coordinate with vendors to ensure firmware or kernel updates are applied. Finally, educating system administrators about this vulnerability and its symptoms will aid in early detection and response.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium, Finland
CVE-2022-49802: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix null pointer dereference in ftrace_add_mod() The @ftrace_mod is allocated by kzalloc(), so both the members {prev,next} of @ftrace_mode->list are NULL, it's not a valid state to call list_del(). If kstrdup() for @ftrace_mod->{func|module} fails, it goes to @out_free tag and calls free_ftrace_mod() to destroy @ftrace_mod, then list_del() will write prev->next and next->prev, where null pointer dereference happens. BUG: kernel NULL pointer dereference, address: 0000000000000008 Oops: 0002 [#1] PREEMPT SMP NOPTI Call Trace: <TASK> ftrace_mod_callback+0x20d/0x220 ? do_filp_open+0xd9/0x140 ftrace_process_regex.isra.51+0xbf/0x130 ftrace_regex_write.isra.52.part.53+0x6e/0x90 vfs_write+0xee/0x3a0 ? __audit_filter_op+0xb1/0x100 ? auditd_test_task+0x38/0x50 ksys_write+0xa5/0xe0 do_syscall_64+0x3a/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd Kernel panic - not syncing: Fatal exception So call INIT_LIST_HEAD() to initialize the list member to fix this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-49802 is a vulnerability in the Linux kernel's ftrace subsystem, specifically within the ftrace_add_mod() function. The issue arises because the ftrace_mod structure is allocated using kzalloc(), which zeroes memory, resulting in the prev and next pointers of the ftrace_mod->list member being NULL initially. When kstrdup() fails to allocate memory for the func or module members of ftrace_mod, the code jumps to an error handling label that calls free_ftrace_mod() to destroy the ftrace_mod instance. However, after this, list_del() is called on the list member without proper initialization, leading to a null pointer dereference since prev and next pointers are NULL. This causes a kernel NULL pointer dereference at address 0x8, triggering a kernel panic and system crash. The root cause is the missing call to INIT_LIST_HEAD() to properly initialize the list pointers before list_del() is invoked. This vulnerability can be triggered by writing to the ftrace_regex interface, as indicated by the call trace involving ftrace_regex_write and related functions. Exploiting this bug results in a denial of service (DoS) due to kernel panic and system unavailability. The vulnerability affects Linux kernel versions identified by the commit hash 673feb9d76ab3eddde7acfd94b206e321cfc90b9 and likely other related versions. No known exploits are reported in the wild, and no CVSS score has been assigned yet. The fix involves adding INIT_LIST_HEAD() to properly initialize the list member to prevent null pointer dereference during error handling.
Potential Impact
For European organizations relying on Linux-based systems, this vulnerability poses a risk of denial of service through kernel panics triggered by malformed inputs to the ftrace subsystem. Systems running affected kernel versions could be crashed remotely or locally if an attacker has the ability to write to the ftrace_regex interface or otherwise trigger the vulnerable code path. This could disrupt critical services, especially in environments where Linux is used for servers, networking equipment, or embedded devices. The impact is primarily availability loss, causing downtime and potential operational disruption. Confidentiality and integrity impacts are not evident from this vulnerability alone. However, repeated crashes could lead to system instability and increased maintenance overhead. Organizations in sectors such as finance, telecommunications, healthcare, and critical infrastructure in Europe, which heavily depend on Linux servers, could face operational risks if unpatched. The lack of known exploits reduces immediate threat but does not eliminate risk, especially as attackers may develop exploits once the vulnerability is public.
Mitigation Recommendations
European organizations should prioritize patching affected Linux kernel versions by applying vendor-provided updates that include the fix for CVE-2022-49802. If immediate patching is not possible, restricting access to the ftrace interfaces, particularly ftrace_regex, can reduce exposure. This can be achieved by limiting permissions to trusted users and processes, and by using kernel lockdown features or mandatory access controls (e.g., SELinux, AppArmor) to prevent unauthorized writes to ftrace controls. Monitoring kernel logs for OOPS or panic messages related to ftrace can help detect exploitation attempts. Additionally, organizations should implement robust system integrity monitoring and maintain backups to enable rapid recovery from crashes. For embedded or specialized Linux systems, coordinate with vendors to ensure firmware or kernel updates are applied. Finally, educating system administrators about this vulnerability and its symptoms will aid in early detection and response.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-05-01T14:05:17.225Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982cc4522896dcbe4c3a
Added to database: 5/21/2025, 9:09:00 AM
Last enriched: 6/30/2025, 1:54:32 AM
Last updated: 8/14/2025, 7:04:22 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.