PT-2026-27674 · Linux · Linux

Published

2026-03-25

·

Updated

2026-03-25

·

CVE-2026-23309

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
tracing: Add NULL pointer check to trigger data free()
If trigger data alloc() fails and returns NULL, event hist trigger parse() jumps to the out free error path. While kfree() safely handles a NULL pointer, trigger data free() does not. This causes a NULL pointer dereference in trigger data free() when evaluating data->cmd ops->set filter.
Fix the problem by adding a NULL pointer check to trigger data free().
The problem was found by an experimental code review agent based on gemini-3.1-pro while reviewing backports into v6.18.y.

Related Identifiers

CVE-2026-23309

Affected Products

Linux