๐Ÿ” CVE Alert

CVE-2025-21648

UNKNOWN 0.0

netfilter: conntrack: clamp maximum hashtable size to INT_MAX

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: clamp maximum hashtable size to INT_MAX Use INT_MAX as maximum size for the conntrack hashtable. Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when resizing hashtable because __GFP_NOWARN is unset. See: 0708a0afe291 ("mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls") Note: hashtable resize is only possible from init_netns.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 19, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
9cc1c73ad66610bffc80b691136ffc1e9a3b1a58 < a965f7f0ea3ae61b9165bed619d5d6da02c75f80 9cc1c73ad66610bffc80b691136ffc1e9a3b1a58 < b1b2353d768f1b80cd7fe045a70adee576b9b338 9cc1c73ad66610bffc80b691136ffc1e9a3b1a58 < 5552b4fd44be3393b930434a7845d8d95a2a3c33 9cc1c73ad66610bffc80b691136ffc1e9a3b1a58 < d5807dd1328bbc86e059c5de80d1bbee9d58ca3d 9cc1c73ad66610bffc80b691136ffc1e9a3b1a58 < f559357d035877b9d0dcd273e0ff83e18e1d46aa 9cc1c73ad66610bffc80b691136ffc1e9a3b1a58 < b541ba7d1f5a5b7b3e2e22dc9e40e18a7d6dbc13
Linux / Linux
4.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/a965f7f0ea3ae61b9165bed619d5d6da02c75f80 git.kernel.org: https://git.kernel.org/stable/c/b1b2353d768f1b80cd7fe045a70adee576b9b338 git.kernel.org: https://git.kernel.org/stable/c/5552b4fd44be3393b930434a7845d8d95a2a3c33 git.kernel.org: https://git.kernel.org/stable/c/d5807dd1328bbc86e059c5de80d1bbee9d58ca3d git.kernel.org: https://git.kernel.org/stable/c/f559357d035877b9d0dcd273e0ff83e18e1d46aa git.kernel.org: https://git.kernel.org/stable/c/b541ba7d1f5a5b7b3e2e22dc9e40e18a7d6dbc13 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html