PT-2026-27674 · Linux · Linux
Published
2026-03-25
·
Updated
2026-03-25
·
CVE-2026-23309
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
tracing: Add NULL pointer check to trigger data free()
If trigger data alloc() fails and returns NULL, event hist trigger parse()
jumps to the out free error path. While kfree() safely handles a NULL
pointer, trigger data free() does not. This causes a NULL pointer
dereference in trigger data free() when evaluating
data->cmd ops->set filter.
Fix the problem by adding a NULL pointer check to trigger data free().
The problem was found by an experimental code review agent based on
gemini-3.1-pro while reviewing backports into v6.18.y.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux