In the Linux kernel, the following vulnerability has been resolved:
tracing: Add NULL pointer check to triggerdatafree()
If triggerdataalloc() fails and returns NULL, eventhisttriggerparse() jumps to the outfree error path. While kfree() safely handles a NULL pointer, triggerdatafree() does not. This causes a NULL pointer dereference in triggerdatafree() when evaluating data->cmdops->setfilter.
Fix the problem by adding a NULL pointer check to triggerdatafree().
The problem was found by an experimental code review agent based on gemini-3.1-pro while reviewing backports into v6.18.y.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23309.json",
"cna_assigner": "Linux"
}