VYPR
Unrated severityNVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68191

CVE-2025-68191

Description

In the Linux kernel, the following vulnerability has been resolved:

udp_tunnel: use netdev_warn() instead of netdev_WARN()

netdev_WARN() uses WARN/WARN_ON to print a backtrace along with file and line information. In this case, udp_tunnel_nic_register() returning an error is just a failed operation, not a kernel bug.

udp_tunnel_nic_register() can fail due to a memory allocation failure (kzalloc() or udp_tunnel_nic_alloc()). This is a normal runtime error and not a kernel bug.

Replace netdev_WARN() with netdev_warn() accordingly.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Linux kernel replaced netdev_WARN() with netdev_warn() in udp_tunnel_nic_register() to prevent unnecessary kernel bug splats from routine allocation failures.

Root

Cause

The Linux kernel function udp_tunnel_nic_register() used netdev_WARN() to log errors when memory allocation (via kzalloc() or udp_tunnel_nic_alloc()) failed. netdev_WARN() triggers a WARN_ON backtrace, which is intended for kernel bugs, not routine runtime errors like memory exhaustion. This mismatch caused unnecessary kernel bug reports ([1]).

Exploitation

An attacker with the ability to exhaust memory on a system can trigger this warning by causing udp_tunnel_nic_register() to fail. No special privileges are required beyond the ability to induce memory pressure. The WARN_ON can lead to system instability (e.g., panic on some configurations) or excessive log flooding.

Impact

The primary impact is a denial-of-service condition: repeated WARN_ON calls can degrade system performance, fill logs, or cause a kernel panic depending on the kernel configuration. The information leak is minimal since the backtrace reveals kernel addresses but not sensitive data.

Mitigation

The fix replaces netdev_WARN() with netdev_warn(), which logs a warning without triggering a kernel bug splat. The patch has been backported to multiple stable kernel trees as referenced in [1]. Users should apply the latest stable updates to eliminate the risk.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.