Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-21648
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-19 Jan, 2025 | 10:18
Updated At-03 Nov, 2025 | 20:58
Rejected At-
▼CVE Numbering Authority (CNA)
netfilter: conntrack: clamp maximum hashtable size to INT_MAX

In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: clamp maximum hashtable size to INT_MAX Use INT_MAX as maximum size for the conntrack hashtable. Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when resizing hashtable because __GFP_NOWARN is unset. See: 0708a0afe291 ("mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls") Note: hashtable resize is only possible from init_netns.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/netfilter/nf_conntrack_core.c
Default Status
unaffected
Versions
Affected
  • From 9cc1c73ad66610bffc80b691136ffc1e9a3b1a58 before a965f7f0ea3ae61b9165bed619d5d6da02c75f80 (git)
  • From 9cc1c73ad66610bffc80b691136ffc1e9a3b1a58 before b1b2353d768f1b80cd7fe045a70adee576b9b338 (git)
  • From 9cc1c73ad66610bffc80b691136ffc1e9a3b1a58 before 5552b4fd44be3393b930434a7845d8d95a2a3c33 (git)
  • From 9cc1c73ad66610bffc80b691136ffc1e9a3b1a58 before d5807dd1328bbc86e059c5de80d1bbee9d58ca3d (git)
  • From 9cc1c73ad66610bffc80b691136ffc1e9a3b1a58 before f559357d035877b9d0dcd273e0ff83e18e1d46aa (git)
  • From 9cc1c73ad66610bffc80b691136ffc1e9a3b1a58 before b541ba7d1f5a5b7b3e2e22dc9e40e18a7d6dbc13 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/netfilter/nf_conntrack_core.c
Default Status
affected
Versions
Affected
  • 4.7
Unaffected
  • From 0 before 4.7 (semver)
  • From 5.10.234 through 5.10.* (semver)
  • From 5.15.177 through 5.15.* (semver)
  • From 6.1.125 through 6.1.* (semver)
  • From 6.6.72 through 6.6.* (semver)
  • From 6.12.10 through 6.12.* (semver)
  • From 6.13 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/a965f7f0ea3ae61b9165bed619d5d6da02c75f80
N/A
https://git.kernel.org/stable/c/b1b2353d768f1b80cd7fe045a70adee576b9b338
N/A
https://git.kernel.org/stable/c/5552b4fd44be3393b930434a7845d8d95a2a3c33
N/A
https://git.kernel.org/stable/c/d5807dd1328bbc86e059c5de80d1bbee9d58ca3d
N/A
https://git.kernel.org/stable/c/f559357d035877b9d0dcd273e0ff83e18e1d46aa
N/A
https://git.kernel.org/stable/c/b541ba7d1f5a5b7b3e2e22dc9e40e18a7d6dbc13
N/A
Hyperlink: https://git.kernel.org/stable/c/a965f7f0ea3ae61b9165bed619d5d6da02c75f80
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b1b2353d768f1b80cd7fe045a70adee576b9b338
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5552b4fd44be3393b930434a7845d8d95a2a3c33
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d5807dd1328bbc86e059c5de80d1bbee9d58ca3d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/f559357d035877b9d0dcd273e0ff83e18e1d46aa
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b541ba7d1f5a5b7b3e2e22dc9e40e18a7d6dbc13
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
N/A
https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html
Resource: N/A
Details not found