In the Linux kernel, the following vulnerability has been resolved:
tracing/trigger: Fix to return error if failed to alloc snapshot
Fix registersnapshottrigger() to return error code if it failed to allocate a snapshot instead of 0 (success). Unless that, it will register snapshot trigger without an error.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26920.json"
}[
{
"id": "CVE-2024-26920-03d0f318",
"deprecated": false,
"digest": {
"line_hashes": [
"255947920396680997295510814486962848306",
"270272270582452279131803042556746010391",
"194660480339116265957817430847994498977",
"121379714683034797725348883630587983122",
"38917983478225866299521487399097235222"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "kernel/trace/trace_events_trigger.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4b001ef14baab16b553a002cb9979e31b8fc0c6b",
"signature_type": "Line"
},
{
"id": "CVE-2024-26920-32d44205",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@36be97e9eb535fe3008a5cb040b1e56f29f2e398",
"signature_version": "v1",
"target": {
"file": "kernel/trace/trace_events_trigger.c"
},
"digest": {
"line_hashes": [
"255947920396680997295510814486962848306",
"270272270582452279131803042556746010391",
"194660480339116265957817430847994498977",
"121379714683034797725348883630587983122",
"38917983478225866299521487399097235222"
],
"threshold": 0.9
},
"signature_type": "Line"
},
{
"id": "CVE-2024-26920-7305d777",
"deprecated": false,
"digest": {
"function_hash": "10272741560911695546558342875421974631",
"length": 167.0
},
"signature_version": "v1",
"target": {
"function": "register_snapshot_trigger",
"file": "kernel/trace/trace_events_trigger.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6022c065c9ec465d84cebff8f480db083e4ee06b",
"signature_type": "Function"
},
{
"id": "CVE-2024-26920-7a5f89e2",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4b001ef14baab16b553a002cb9979e31b8fc0c6b",
"signature_version": "v1",
"target": {
"function": "register_snapshot_trigger",
"file": "kernel/trace/trace_events_trigger.c"
},
"digest": {
"function_hash": "10272741560911695546558342875421974631",
"length": 167.0
},
"signature_type": "Function"
},
{
"id": "CVE-2024-26920-7fa9be97",
"deprecated": false,
"digest": {
"function_hash": "10272741560911695546558342875421974631",
"length": 167.0
},
"signature_version": "v1",
"target": {
"function": "register_snapshot_trigger",
"file": "kernel/trace/trace_events_trigger.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@36be97e9eb535fe3008a5cb040b1e56f29f2e398",
"signature_type": "Function"
},
{
"id": "CVE-2024-26920-a068ab5c",
"deprecated": false,
"digest": {
"line_hashes": [
"255947920396680997295510814486962848306",
"270272270582452279131803042556746010391",
"194660480339116265957817430847994498977",
"121379714683034797725348883630587983122",
"38917983478225866299521487399097235222"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "kernel/trace/trace_events_trigger.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6022c065c9ec465d84cebff8f480db083e4ee06b",
"signature_type": "Line"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26920.json"