Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1462 articles · 106504 vulns · 38/55 feeds (7d)
← Back to list
0.0
CVE-2026-23380

tracing: Fix WARN_ON in tracing_buffers_mmap_close

Description

In the Linux kernel, the following vulnerability has been resolved: tracing: Fix WARN_ON in tracing_buffers_mmap_close When a process forks, the child process copies the parent's VMAs but the user_mapped reference count is not incremented. As a result, when both the parent and child processes exit, tracing_buffers_mmap_close() is called twice. On the second call, user_mapped is already 0, causing the function to return -ENODEV and triggering a WARN_ON. Normally, this isn't an issue as the memory is mapped with VM_DONTCOPY set. But this is only a hint, and the application can call madvise(MADVISE_DOFORK) which resets the VM_DONTCOPY flag. When the application does that, it can trigger this issue on fork. Fix it by incrementing the user_mapped reference count without re-mapping the pages in the VMA's open callback.

Affected Products

VendorProductVersions
LinuxLinuxcf9f0f7c4c5bb45e7bb270e48bab6f7837825a64, cf9f0f7c4c5bb45e7bb270e48bab6f7837825a64, cf9f0f7c4c5bb45e7bb270e48bab6f7837825a64, cf9f0f7c4c5bb45e7bb270e48bab6f7837825a64, 6.10, 6.12.77, 6.18.17, 6.19.7, 7.0-rc3, 6.12.76, 6.18.16, 6.19.6, 7.0-rc2

References

  • https://git.kernel.org/stable/c/91f3e8d84c89918769e71393f839c9fefadc2580
  • https://git.kernel.org/stable/c/cdd96641b64297a2db42676f051362b76280a58b
  • https://git.kernel.org/stable/c/b0f269ba6fefe9e3cb9feedcf78fcd0b633800c0
  • https://git.kernel.org/stable/c/e39bb9e02b68942f8e9359d2a3efe7d37ae6be0e

Related News (2 articles)

Tier C
VulDB2h ago
CVE-2026-23380 | Linux Kernel up to 6.12.76/6.18.16/6.19.6/7.0-rc2 tracing_buffers_mmap_close reference count
→ No new info (linked only)
Tier C
Linux Kernel CVEs4h ago
CVE-2026-23380: tracing: Fix WARN_ON in tracing_buffers_mmap_close
→ No new info (linked only)
CVSS 3.10.0 CRITICAL
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-119
Published3/25/2026
Last enriched2h agov3
Trending Score50
Source articles2
Independent2
Info Completeness10/14
Missing: epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Version History

v3
Last enriched 2h ago
v3Tier C2h ago

Updated affected versions to include 6.12.76, 6.18.16, 6.19.6, and 7.0-rc2, changed severity to CRITICAL, and noted that no exploit is available.

affectedVersionsseverity
via VulDB
v2Tier C3h ago

Updated description with more technical detail, added affected versions 6.12.77, 6.18.17, 6.19.7, and 7.0-rc3, changed severity to HIGH, and marked exploit as available and actively exploited.

descriptionaffectedVersionsseveritycvssEstimatecweIdsexploitAvailableactivelyExploitedpatchAvailable
via Linux Kernel CVEs
v14h ago

Initial creation