CVE-2026-23309 — NULL Pointer Dereference in Linux
Severity
5.3MEDIUM
No vectorEPSS
0.0%
top 90.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 25
Description
In the Linux kernel, the following vulnerability has been resolved:
tracing: Add NULL pointer check to trigger_data_free()
If trigger_data_alloc() fails and returns NULL, event_hist_trigger_parse()
jumps to the out_free error path. While kfree() safely handles a NULL
pointer, trigger_data_free() does not. This causes a NULL pointer
dereference in trigger_data_free() when evaluating
data->cmd_ops->set_filter.
Fix the problem by adding a NULL pointer check to trigger_data_free().
The problem w…
Affected Packages4 packages
▶CVEListV5linux/linuxc10f0efe57728508d796ae4ba7abe4c14ec3d8ef — 13dcd9269e225e4c4ceabdaeebe2ce4661b54c6e+10
🔴Vulnerability Details
3OSV▶
CVE-2026-23309: In the Linux kernel, the following vulnerability has been resolved: tracing: Add NULL pointer check to trigger_data_free() If trigger_data_alloc() fai↗2026-03-25
GHSA▶
GHSA-f7v6-c4j6-g8wv: In the Linux kernel, the following vulnerability has been resolved:
tracing: Add NULL pointer check to trigger_data_free()
If trigger_data_alloc() f↗2026-03-25