U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-26920 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: tracing/trigger: Fix to return error if failed to alloc snapshot Fix register_snapshot_trigger() to return error code if it failed to allocate a snapshot instead of 0 (success). Unless that, it will register snapshot trigger without an error.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/0958b33ef5a04ed91f61cef4760ac412080c4e08
https://git.kernel.org/stable/c/2450a69d2ee75d1f0112d509ac82ef98f5ad6b5f
https://git.kernel.org/stable/c/26ebeffff238488466fa578be3b35b8a46e69906
https://git.kernel.org/stable/c/2a3073d58382157ab396734ed4e421ba9e969db1
https://git.kernel.org/stable/c/34925d01baf3ee62ab21c21efd9e2c44c24c004a
https://git.kernel.org/stable/c/36be97e9eb535fe3008a5cb040b1e56f29f2e398
https://git.kernel.org/stable/c/4b001ef14baab16b553a002cb9979e31b8fc0c6b
https://git.kernel.org/stable/c/56cfbe60710772916a5ba092c99542332b48e870
https://git.kernel.org/stable/c/6022c065c9ec465d84cebff8f480db083e4ee06b
https://git.kernel.org/stable/c/8ffd5590f4d6ef5460acbeac7fbdff7025f9b419
https://git.kernel.org/stable/c/b5085b5ac1d96ea2a8a6240f869655176ce44197
https://git.kernel.org/stable/c/bcf4a115a5068f3331fafb8c176c1af0da3d8b19

Weakness Enumeration

CWE-ID CWE Name Source

Change History

5 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-26920
NVD Published Date:
04/17/2024
NVD Last Modified:
05/03/2024
Source:
kernel.org