CVE-2026-23380Improper Update of Reference Count in Linux

Severity
3.3LOW
No vector
EPSS
0.0%
top 93.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 25

Description

In the Linux kernel, the following vulnerability has been resolved: tracing: Fix WARN_ON in tracing_buffers_mmap_close When a process forks, the child process copies the parent's VMAs but the user_mapped reference count is not incremented. As a result, when both the parent and child processes exit, tracing_buffers_mmap_close() is called twice. On the second call, user_mapped is already 0, causing the function to return -ENODEV and triggering a WARN_ON. Normally, this isn't an issue as the mem

Affected Packages4 packages

Linuxlinux/linux_kernel6.10.06.12.77+2
Debianlinux/linux_kernel< 6.19.8-1
CVEListV5linux/linuxcf9f0f7c4c5bb45e7bb270e48bab6f7837825a6491f3e8d84c89918769e71393f839c9fefadc2580+4
debiandebian/linux< linux 6.19.8-1 (forky)

🔴Vulnerability Details

3
OSV
tracing: Fix WARN_ON in tracing_buffers_mmap_close2026-03-25
GHSA
GHSA-q6xr-q445-2xxh: In the Linux kernel, the following vulnerability has been resolved: tracing: Fix WARN_ON in tracing_buffers_mmap_close When a process forks, the chi2026-03-25
OSV
CVE-2026-23380: In the Linux kernel, the following vulnerability has been resolved: tracing: Fix WARN_ON in tracing_buffers_mmap_close When a process forks, the child2026-03-25

📋Vendor Advisories

2
Red Hat
kernel: tracing: Fix WARN_ON in tracing_buffers_mmap_close2026-03-25
Debian
CVE-2026-23380: linux - In the Linux kernel, the following vulnerability has been resolved: tracing: Fi...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23380 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23380 — Improper Update of Reference Count | cvebase