Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2026-23309

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
25/03/2026
Última modificación:
25/03/2026

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tracing: Add NULL pointer check to trigger_data_free()<br /> <br /> If trigger_data_alloc() fails and returns NULL, event_hist_trigger_parse()<br /> jumps to the out_free error path. While kfree() safely handles a NULL<br /> pointer, trigger_data_free() does not. This causes a NULL pointer<br /> dereference in trigger_data_free() when evaluating<br /> data-&gt;cmd_ops-&gt;set_filter.<br /> <br /> Fix the problem by adding a NULL pointer check to trigger_data_free().<br /> <br /> The problem was found by an experimental code review agent based on<br /> gemini-3.1-pro while reviewing backports into v6.18.y.

Impacto