CVE-2025-68329 — Improper Update of Reference Count in Linux
Severity
7.2HIGHOSV
No vectorEPSS
0.0%
top 93.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 22
Latest updateApr 6
Description
In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs
When a VMA is split (e.g., by partial munmap or MAP_FIXED), the kernel
calls vm_ops->close on each portion. For trace buffer mappings, this
results in ring_buffer_unmap() being called multiple times while
ring_buffer_map() was only called once.
This causes ring_buffer_unmap() to return -ENODEV on subsequent calls
because user_mapped is already 0, triggering a W…
Affected Packages5 packages
▶CVEListV5linux/linuxcf9f0f7c4c5bb45e7bb270e48bab6f7837825a64 — 922fdd0b755a84f9933b3ca195f60092b6bb88ee+3