-
CVE-2025-68329
- EPSS 0.02%
- Veröffentlicht 22.12.2025 16:12:23
- Zuletzt bearbeitet 23.12.2025 14:51:52
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs When a VMA is split (e.g., by partial munmap or MAP_FIXED), the kernel calls vm_ops->close on each portion. For trace buffer mappings, this results in ring_buffer_unmap() being called multiple times while ring_buffer_map() was only called once. This causes ring_buffer_unmap() to return -ENODEV on subsequent calls because user_mapped is already 0, triggering a WARN_ON. Trace buffer mappings cannot support partial mappings because the ring buffer structure requires the complete buffer including the meta page. Fix this by adding a may_split callback that returns -EINVAL to prevent VMA splits entirely.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
922fdd0b755a84f9933b3ca195f60092b6bb88ee
Version
cf9f0f7c4c5bb45e7bb270e48bab6f7837825a64
Status
affected
Version <
45053c12c45f0fb8ef6ab95118dd928d2fec0255
Version
cf9f0f7c4c5bb45e7bb270e48bab6f7837825a64
Status
affected
Version <
b042fdf18e89a347177a49e795d8e5184778b5b6
Version
cf9f0f7c4c5bb45e7bb270e48bab6f7837825a64
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.10
Status
affected
Version <
6.10
Version
0
Status
unaffected
Version <=
6.12.*
Version
6.12.61
Status
unaffected
Version <=
6.17.*
Version
6.17.11
Status
unaffected
Version <=
*
Version
6.18
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.058 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|