๐Ÿ” CVE Alert

CVE-2026-23380

UNKNOWN 0.0

tracing: Fix WARN_ON in tracing_buffers_mmap_close

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: tracing: Fix WARN_ON in tracing_buffers_mmap_close When a process forks, the child process copies the parent's VMAs but the user_mapped reference count is not incremented. As a result, when both the parent and child processes exit, tracing_buffers_mmap_close() is called twice. On the second call, user_mapped is already 0, causing the function to return -ENODEV and triggering a WARN_ON. Normally, this isn't an issue as the memory is mapped with VM_DONTCOPY set. But this is only a hint, and the application can call madvise(MADVISE_DOFORK) which resets the VM_DONTCOPY flag. When the application does that, it can trigger this issue on fork. Fix it by incrementing the user_mapped reference count without re-mapping the pages in the VMA's open callback.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 25, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
cf9f0f7c4c5bb45e7bb270e48bab6f7837825a64 < 91f3e8d84c89918769e71393f839c9fefadc2580 cf9f0f7c4c5bb45e7bb270e48bab6f7837825a64 < cdd96641b64297a2db42676f051362b76280a58b cf9f0f7c4c5bb45e7bb270e48bab6f7837825a64 < b0f269ba6fefe9e3cb9feedcf78fcd0b633800c0 cf9f0f7c4c5bb45e7bb270e48bab6f7837825a64 < e39bb9e02b68942f8e9359d2a3efe7d37ae6be0e
Linux / Linux
6.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/91f3e8d84c89918769e71393f839c9fefadc2580 git.kernel.org: https://git.kernel.org/stable/c/cdd96641b64297a2db42676f051362b76280a58b git.kernel.org: https://git.kernel.org/stable/c/b0f269ba6fefe9e3cb9feedcf78fcd0b633800c0 git.kernel.org: https://git.kernel.org/stable/c/e39bb9e02b68942f8e9359d2a3efe7d37ae6be0e