CVE-2026-23380

Source
https://cve.org/CVERecord?id=CVE-2026-23380
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23380.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23380
Downstream
Published
2026-03-25T10:27:59.682Z
Modified
2026-04-02T13:12:23.373216Z
Summary
tracing: Fix WARN_ON in tracing_buffers_mmap_close
Details

In the Linux kernel, the following vulnerability has been resolved:

tracing: Fix WARNON in tracingbuffersmmapclose

When a process forks, the child process copies the parent's VMAs but the usermapped reference count is not incremented. As a result, when both the parent and child processes exit, tracingbuffersmmapclose() is called twice. On the second call, usermapped is already 0, causing the function to return -ENODEV and triggering a WARNON.

Normally, this isn't an issue as the memory is mapped with VMDONTCOPY set. But this is only a hint, and the application can call madvise(MADVISEDOFORK) which resets the VM_DONTCOPY flag. When the application does that, it can trigger this issue on fork.

Fix it by incrementing the user_mapped reference count without re-mapping the pages in the VMA's open callback.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23380.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cf9f0f7c4c5bb45e7bb270e48bab6f7837825a64
Fixed
91f3e8d84c89918769e71393f839c9fefadc2580
Fixed
cdd96641b64297a2db42676f051362b76280a58b
Fixed
b0f269ba6fefe9e3cb9feedcf78fcd0b633800c0
Fixed
e39bb9e02b68942f8e9359d2a3efe7d37ae6be0e

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23380.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.10.0
Fixed
6.12.77
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.17
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23380.json"