CVE-2025-68186
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's ring buffer implementation, specifically the function ring_buffer_map_get_reader(). The function was issuing warnings incorrectly when the reader caught up to the writer but still had data to read on the current reader page. This situation was not properly checked, causing unnecessary warnings. The fix ensures that when the reader catches up and there is no new page to get, the reader page is not updated and no warning is triggered.
How can this vulnerability impact me? :
This vulnerability causes incorrect warnings in the Linux kernel ring buffer system when the reader catches up to the writer. While it does not indicate a security breach or data loss, it may lead to confusion or misinterpretation of system logs or behavior due to these unnecessary warnings.