Home

Description

In the Linux kernel, the following vulnerability has been resolved: tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs When a VMA is split (e.g., by partial munmap or MAP_FIXED), the kernel calls vm_ops->close on each portion. For trace buffer mappings, this results in ring_buffer_unmap() being called multiple times while ring_buffer_map() was only called once. This causes ring_buffer_unmap() to return -ENODEV on subsequent calls because user_mapped is already 0, triggering a WARN_ON. Trace buffer mappings cannot support partial mappings because the ring buffer structure requires the complete buffer including the meta page. Fix this by adding a may_split callback that returns -EINVAL to prevent VMA splits entirely.

PUBLISHED Reserved 2025-12-16 | Published 2025-12-22 | Updated 2025-12-22 | Assigner Linux

Product status

Default status
unaffected

cf9f0f7c4c5bb45e7bb270e48bab6f7837825a64 (git) before 922fdd0b755a84f9933b3ca195f60092b6bb88ee
affected

cf9f0f7c4c5bb45e7bb270e48bab6f7837825a64 (git) before 45053c12c45f0fb8ef6ab95118dd928d2fec0255
affected

cf9f0f7c4c5bb45e7bb270e48bab6f7837825a64 (git) before b042fdf18e89a347177a49e795d8e5184778b5b6
affected

Default status
affected

6.10
affected

Any version before 6.10
unaffected

6.12.61 (semver)
unaffected

6.17.11 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/922fdd0b755a84f9933b3ca195f60092b6bb88ee

git.kernel.org/...c/45053c12c45f0fb8ef6ab95118dd928d2fec0255

git.kernel.org/...c/b042fdf18e89a347177a49e795d8e5184778b5b6

cve.org (CVE-2025-68329)

nvd.nist.gov (CVE-2025-68329)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.