CVE-2025-21648
netfilter: conntrack: clamp maximum hashtable size to INT_MAX
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: clamp maximum hashtable size to INT_MAX Use INT_MAX as maximum size for the conntrack hashtable. Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when resizing hashtable because __GFP_NOWARN is unset. See: 0708a0afe291 ("mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls") Note: hashtable resize is only possible from init_netns.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Jan 19, 2025 |
| Last Updated | May 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
9cc1c73ad66610bffc80b691136ffc1e9a3b1a58 < a965f7f0ea3ae61b9165bed619d5d6da02c75f80 9cc1c73ad66610bffc80b691136ffc1e9a3b1a58 < b1b2353d768f1b80cd7fe045a70adee576b9b338 9cc1c73ad66610bffc80b691136ffc1e9a3b1a58 < 5552b4fd44be3393b930434a7845d8d95a2a3c33 9cc1c73ad66610bffc80b691136ffc1e9a3b1a58 < d5807dd1328bbc86e059c5de80d1bbee9d58ca3d 9cc1c73ad66610bffc80b691136ffc1e9a3b1a58 < f559357d035877b9d0dcd273e0ff83e18e1d46aa 9cc1c73ad66610bffc80b691136ffc1e9a3b1a58 < b541ba7d1f5a5b7b3e2e22dc9e40e18a7d6dbc13
Linux / Linux
4.7
References
git.kernel.org: https://git.kernel.org/stable/c/a965f7f0ea3ae61b9165bed619d5d6da02c75f80 git.kernel.org: https://git.kernel.org/stable/c/b1b2353d768f1b80cd7fe045a70adee576b9b338 git.kernel.org: https://git.kernel.org/stable/c/5552b4fd44be3393b930434a7845d8d95a2a3c33 git.kernel.org: https://git.kernel.org/stable/c/d5807dd1328bbc86e059c5de80d1bbee9d58ca3d git.kernel.org: https://git.kernel.org/stable/c/f559357d035877b9d0dcd273e0ff83e18e1d46aa git.kernel.org: https://git.kernel.org/stable/c/b541ba7d1f5a5b7b3e2e22dc9e40e18a7d6dbc13 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html