CVE-2026-23309: In the Linux kernel, the following vulnerability has been resolved: tracing: Add NULL pointer check to trigger_data_fre
infovulnerability
security
Summary
A vulnerability in the Linux kernel's tracing system occurs when trigger_data_alloc() (a memory allocation function) fails and returns NULL, causing the error handler to call trigger_data_free() on a null value. Unlike the safe kfree() function, trigger_data_free() doesn't check for NULL pointers before trying to access data, leading to a crash when it tries to evaluate data->cmd_ops->set_filter.
Solution / Mitigation
Add a NULL pointer check to trigger_data_free() to prevent it from attempting to dereference a NULL pointer.
Vulnerability Details
EPSS (30-day exploit probability)
EPSS: 0.0%
Disclosure Date
March 25, 2026
Classification
Attack SophisticationModerate
Monthly digest — independent AI security research
Original source: https://nvd.nist.gov/vuln/detail/CVE-2026-23309
First tracked: March 25, 2026 at 11:46 AM
Classified by LLM (prompt v3) · confidence: 95%