{"id":"CVE-2025-68329","summary":"tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs\n\nWhen a VMA is split (e.g., by partial munmap or MAP_FIXED), the kernel\ncalls vm_ops-\u003eclose on each portion. For trace buffer mappings, this\nresults in ring_buffer_unmap() being called multiple times while\nring_buffer_map() was only called once.\n\nThis causes ring_buffer_unmap() to return -ENODEV on subsequent calls\nbecause user_mapped is already 0, triggering a WARN_ON.\n\nTrace buffer mappings cannot support partial mappings because the ring\nbuffer structure requires the complete buffer including the meta page.\n\nFix this by adding a may_split callback that returns -EINVAL to prevent\nVMA splits entirely.","modified":"2026-05-07T04:17:24.292296Z","published":"2025-12-22T16:12:23.133Z","related":["SUSE-SU-2026:20838-1","SUSE-SU-2026:20931-1","SUSE-SU-2026:21284-1","openSUSE-SU-2026:20416-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68329.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/45053c12c45f0fb8ef6ab95118dd928d2fec0255"},{"type":"WEB","url":"https://git.kernel.org/stable/c/922fdd0b755a84f9933b3ca195f60092b6bb88ee"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b042fdf18e89a347177a49e795d8e5184778b5b6"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68329.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68329"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"cf9f0f7c4c5bb45e7bb270e48bab6f7837825a64"},{"fixed":"922fdd0b755a84f9933b3ca195f60092b6bb88ee"},{"fixed":"45053c12c45f0fb8ef6ab95118dd928d2fec0255"},{"fixed":"b042fdf18e89a347177a49e795d8e5184778b5b6"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68329.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"6.10.0"},{"fixed":"6.12.61"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.11"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68329.json"}}],"schema_version":"1.7.5"}