VYPR
Medium severity5.5NVD Advisory· Published Apr 17, 2024· Updated May 12, 2026

CVE-2024-26920

CVE-2024-26920

Description

In the Linux kernel, the following vulnerability has been resolved:

tracing/trigger: Fix to return error if failed to alloc snapshot

Fix register_snapshot_trigger() to return error code if it failed to allocate a snapshot instead of 0 (success). Unless that, it will register snapshot trigger without an error.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, register_snapshot_trigger() returns success even on snapshot allocation failure, leading to potential NULL dereference and system crash.

Vulnerability

Description

CVE-2024-26920 is a vulnerability in the Linux kernel's tracing subsystem, specifically in the register_snapshot_trigger() function. The issue arises because the function fails to return an error code when memory allocation for a snapshot buffer fails. Instead, it returns 0 (success), allowing a snapshot trigger to be registered without an associated snapshot buffer. This can lead to a NULL pointer dereference when the trigger is subsequently activated.

Exploitation

An attacker with local access and the ability to create tracing triggers (typically requiring root or CAP_SYS_ADMIN privileges) can exploit this flaw. By inducing memory pressure to cause allocation failure and then registering a snapshot trigger, the attacker can set up a scenario where the kernel dereferences a NULL pointer. No special network position or authentication is required beyond local shell access.

Impact

Successful exploitation results in a kernel panic, causing a denial of service (system crash). This can be used to disrupt system availability. The vulnerability does not lead to privilege escalation or data corruption.

Mitigation

The issue is fixed in the Linux kernel with commits (e.g., [2][3][4]). Users should update to kernel versions containing the fix. The vulnerability affects the Linux kernel and, as noted in advisory [1], impacts products such as SIMATIC S7-1500 TM MFP's GNU/Linux subsystem. Siemens has provided remediation guidance in their security advisory.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

120

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

13

News mentions

0

No linked articles in our index yet.