HomeDefectsLIN1025-6523
Acknowledged

LIN1025-6523 : Security Advisory - linux - CVE-2025-68186

Created: Dec 16, 2025    Updated: Dec 18, 2025
Found In Version: 10.25.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 25
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:[EOL][EOL]ring-buffer: Do not warn in ring_buffer_map_get_reader() when reader catches up[EOL][EOL]The function ring_buffer_map_get_reader() is a bit more strict than the[EOL]other get reader functions, and except for certain situations the[EOL]rb_get_reader_page() should not return NULL. If it does, it triggers a[EOL]warning.[EOL][EOL]This warning was triggering but after looking at why, it was because[EOL]another acceptable situation was happening and it wasn't checked for.[EOL][EOL]If the reader catches up to the writer and there's still data to be read[EOL]on the reader page, then the rb_get_reader_page() will return NULL as[EOL]there's no new page to get.[EOL][EOL]In this situation, the reader page should not be updated and no warning[EOL]should trigger.
Live chat
Online