CVE-2026-23380 — Improper Update of Reference Count in Linux
Severity
3.3LOW
No vectorEPSS
0.0%
top 93.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 25
Description
In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix WARN_ON in tracing_buffers_mmap_close
When a process forks, the child process copies the parent's VMAs but the
user_mapped reference count is not incremented. As a result, when both the
parent and child processes exit, tracing_buffers_mmap_close() is called
twice. On the second call, user_mapped is already 0, causing the function to
return -ENODEV and triggering a WARN_ON.
Normally, this isn't an issue as the mem…
Affected Packages4 packages
▶CVEListV5linux/linuxcf9f0f7c4c5bb45e7bb270e48bab6f7837825a64 — 91f3e8d84c89918769e71393f839c9fefadc2580+4
🔴Vulnerability Details
3GHSA▶
GHSA-q6xr-q445-2xxh: In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix WARN_ON in tracing_buffers_mmap_close
When a process forks, the chi↗2026-03-25
OSV▶
CVE-2026-23380: In the Linux kernel, the following vulnerability has been resolved: tracing: Fix WARN_ON in tracing_buffers_mmap_close When a process forks, the child↗2026-03-25