CVE-2025-68186 — Incorrect Check of Function Return Value in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 90.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 16
Latest updateFeb 24
Description
In the Linux kernel, the following vulnerability has been resolved:
ring-buffer: Do not warn in ring_buffer_map_get_reader() when reader catches up
The function ring_buffer_map_get_reader() is a bit more strict than the
other get reader functions, and except for certain situations the
rb_get_reader_page() should not return NULL. If it does, it triggers a
warning.
This warning was triggering but after looking at why, it was because
another acceptable situation was happening and it wasn't check…
Affected Packages5 packages
▶CVEListV5linux/linux117c39200d9d760cbd5944bb89efb7b9c51965aa — b42dbef4f208326271434d5ab71c4129a3ddd1a9+3