{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-68321","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-16T14:48:05.295Z","datePublished":"2025-12-16T15:44:19.066Z","dateUpdated":"2026-05-11T21:50:54.752Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:50:54.752Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\npage_pool: always add GFP_NOWARN for ATOMIC allocations\n\nDriver authors often forget to add GFP_NOWARN for page allocation\nfrom the datapath. This is annoying to users as OOMs are a fact\nof life, and we pretty much expect network Rx to hit page allocation\nfailures during OOM. Make page pool add GFP_NOWARN for ATOMIC allocations\nby default."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/core/page_pool.c"],"versions":[{"version":"ff7d6b27f894f1469dc51ccb828b7363ccd9799f","lessThan":"0ec2cd5c58793d0c622797cd5fbe26634b357210","status":"affected","versionType":"git"},{"version":"ff7d6b27f894f1469dc51ccb828b7363ccd9799f","lessThan":"9835a0fd59a1df5ec0740fdab6d50db68e0f10de","status":"affected","versionType":"git"},{"version":"ff7d6b27f894f1469dc51ccb828b7363ccd9799f","lessThan":"7613c06ffa89c1e2266fb532e23ef7dfdf269d73","status":"affected","versionType":"git"},{"version":"ff7d6b27f894f1469dc51ccb828b7363ccd9799f","lessThan":"3671a0775952026228ae44e096eb144bca75f8dc","status":"affected","versionType":"git"},{"version":"ff7d6b27f894f1469dc51ccb828b7363ccd9799f","lessThan":"ab48dc0e23eb714b3f233f8e8f6deed7df2051f5","status":"affected","versionType":"git"},{"version":"ff7d6b27f894f1469dc51ccb828b7363ccd9799f","lessThan":"f3b52167a0cb23b27414452fbc1278da2ee884fc","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/core/page_pool.c"],"versions":[{"version":"4.18","status":"affected"},{"version":"0","lessThan":"4.18","status":"unaffected","versionType":"semver"},{"version":"5.15.197","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.159","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.117","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.58","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.17.8","lessThanOrEqual":"6.17.*","status":"unaffected","versionType":"semver"},{"version":"6.18","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"5.15.197"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"6.1.159"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"6.6.117"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"6.12.58"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"6.17.8"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.18","versionEndExcluding":"6.18"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/0ec2cd5c58793d0c622797cd5fbe26634b357210"},{"url":"https://git.kernel.org/stable/c/9835a0fd59a1df5ec0740fdab6d50db68e0f10de"},{"url":"https://git.kernel.org/stable/c/7613c06ffa89c1e2266fb532e23ef7dfdf269d73"},{"url":"https://git.kernel.org/stable/c/3671a0775952026228ae44e096eb144bca75f8dc"},{"url":"https://git.kernel.org/stable/c/ab48dc0e23eb714b3f233f8e8f6deed7df2051f5"},{"url":"https://git.kernel.org/stable/c/f3b52167a0cb23b27414452fbc1278da2ee884fc"}],"title":"page_pool: always add GFP_NOWARN for ATOMIC allocations","x_generator":{"engine":"bippy-1.2.0"}}}}