Description
In the Linux kernel, the following vulnerability has been resolved:

tracing: Add recursion protection in kernel stack trace recording

A bug was reported about an infinite recursion caused by tracing the rcu
events with the kernel stack trace trigger enabled. The stack trace code
called back into RCU which then called the stack trace again.

Expand the ftrace recursion protection to add a set of bits to protect
events from recursion. Each bit represents the context that the event is
in (normal, softirq, interrupt and NMI).

Have the stack trace code use the interrupt context to protect against
recursion.

Note, the bug showed an issue in both the RCU code as well as the tracing
stacktrace code. This only handles the tracing stack trace side of the
bug. The RCU fix will be handled separately.
Published: 2026-02-14
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch Now
AI Analysis

Impact

A bug in the Linux kernel tracing subsystem could cause an infinite recursion when RCU events are traced with the stack trace trigger enabled. The recursion occurs because the stack trace code calls back into RCU, which then triggers the stack trace again, exhausting the kernel stack and resulting in a kernel panic or system crash. The recent fix introduces recursion protection bits so that retracing is prevented, mitigating the denial of service potential. Without the patch, an attacker with the ability to enable kernel tracing may be able to voluntarily trigger this crash and render the system unavailable.

Affected Systems

This issue affected all Linux kernel releases prior to the inclusion of the recursion protection fix, including the early release candidates of kernel 6.19 (rc1 through rc4) and earlier stable releases. It applies to any system running the standard Linux kernel where RCU tracing is enabled and the stack trace trigger is active.

Risk and Exploitability

The CVSS score of 5.5 indicates a medium severity vulnerability. The EPSS score of less than 1% suggests a low likelihood of exploitation in the wild, and the vulnerability is not listed in CISA's KEV catalog. The attack vector most likely requires a privileged or root user to enable the specific tracing configuration that triggers the recursion. An unprivileged user cannot exploit the flaw unless kernel configuration permits arbitrary kernel tracing.

Generated by OpenCVE AI on April 16, 2026 at 06:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a kernel that includes the recursion protection commit, such as Linux kernel 6.19.0 or later, or apply the specific patch (commit 19e18e6) from the kernel source.
  • If an immediate kernel upgrade is not feasible, disable the RCU tracing feature or the stack trace trigger by adjusting kernel configuration or using system controls to prevent the recursion path from activating.
  • Continuously monitor system logs for trace-related recursion errors after the update to confirm that the issue has been resolved.

Generated by OpenCVE AI on April 16, 2026 at 06:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-703

Wed, 25 Mar 2026 10:45:00 +0000


Tue, 17 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Tue, 17 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Sat, 14 Feb 2026 15:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: tracing: Add recursion protection in kernel stack trace recording A bug was reported about an infinite recursion caused by tracing the rcu events with the kernel stack trace trigger enabled. The stack trace code called back into RCU which then called the stack trace again. Expand the ftrace recursion protection to add a set of bits to protect events from recursion. Each bit represents the context that the event is in (normal, softirq, interrupt and NMI). Have the stack trace code use the interrupt context to protect against recursion. Note, the bug showed an issue in both the RCU code as well as the tracing stacktrace code. This only handles the tracing stack trace side of the bug. The RCU fix will be handled separately.
Title tracing: Add recursion protection in kernel stack trace recording
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-03-25T10:20:23.720Z

Reserved: 2026-01-13T15:37:45.972Z

Link: CVE-2026-23138

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2026-02-14T16:15:53.830

Modified: 2026-03-25T11:16:19.087

Link: CVE-2026-23138

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-02-14T00:00:00Z

Links: CVE-2026-23138 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T07:00:10Z

Weaknesses