Description
In the Linux kernel, the following vulnerability has been resolved:

tracing: Add NULL pointer check to trigger_data_free()

If trigger_data_alloc() fails and returns NULL, event_hist_trigger_parse()
jumps to the out_free error path. While kfree() safely handles a NULL
pointer, trigger_data_free() does not. This causes a NULL pointer
dereference in trigger_data_free() when evaluating
data->cmd_ops->set_filter.

Fix the problem by adding a NULL pointer check to trigger_data_free().

The problem was found by an experimental code review agent based on
gemini-3.1-pro while reviewing backports into v6.18.y.
Published: 2026-03-25
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Kernel crash causing denial of service
Action: Immediate Patch
AI Analysis

Impact

A failure in the Linux kernel tracing subsystem may cause trigger_data_free() to dereference a NULL pointer, resulting in a kernel panic and a system reboot. The impact is a denial of service of the affected host, not a remote code execution or data theft.

Affected Systems

The flaw resides in the Linux kernel tracing code, affecting all kernel releases that contain the trigger_data_free routine prior to the introduction of a NULL check. The vulnerability was discovered in backports to version 6.18.y, so any distribution shipping those or earlier kernels without the patch is impacted.

Risk and Exploitability

The exploit probability is very low (EPSS < 1%) and the issue is not listed in CISA’s KEV catalog. Nonetheless, a local or privileged attacker can trigger the vulnerable path and force a kernel crash, resulting in temporary denial of service. The risk is moderate but mitigated by the low likelihood of exploitation and the availability of a kernel update that resolves the issue.

Generated by OpenCVE AI on March 26, 2026 at 02:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the running kernel version on the system.
  • Apply the latest stable kernel release from the distribution, ensuring that the backported patch adding a NULL check to trigger_data_free() is present.
  • If a full kernel upgrade is not possible, consider disabling unused kernel tracing features to reduce the attack surface until a patch can be applied.
  • Monitor system logs for kernel panic entries mentioning trigger_data_free() to detect attempts to exploit the flaw.
  • If an advisory from the distribution vendor is available, follow the vendor’s recommended update or replacement procedures.

Generated by OpenCVE AI on March 26, 2026 at 02:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 00:15:00 +0000


Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Wed, 25 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: tracing: Add NULL pointer check to trigger_data_free() If trigger_data_alloc() fails and returns NULL, event_hist_trigger_parse() jumps to the out_free error path. While kfree() safely handles a NULL pointer, trigger_data_free() does not. This causes a NULL pointer dereference in trigger_data_free() when evaluating data->cmd_ops->set_filter. Fix the problem by adding a NULL pointer check to trigger_data_free(). The problem was found by an experimental code review agent based on gemini-3.1-pro while reviewing backports into v6.18.y.
Title tracing: Add NULL pointer check to trigger_data_free()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:04:23.455Z

Reserved: 2026-01-13T15:37:45.994Z

Link: CVE-2026-23309

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T11:16:26.993

Modified: 2026-03-25T15:41:33.977

Link: CVE-2026-23309

cve-icon Redhat

Severity :

Publid Date: 2026-03-25T00:00:00Z

Links: CVE-2026-23309 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:16:47Z

Weaknesses