Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-38201
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-04 Jul, 2025 | 13:37
Updated At-12 Feb, 2026 | 08:19
Rejected At-
▼CVE Numbering Authority (CNA)
netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when resizing hashtable because __GFP_NOWARN is unset. Similar to: b541ba7d1f5a ("netfilter: conntrack: clamp maximum hashtable size to INT_MAX")

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/netfilter/nft_set_pipapo.c
Default Status
unaffected
Versions
Affected
  • From 3c4287f62044a90e73a561aa05fc46e62da173da before 1fe27f97944017a9d3c5af4d6d95282bff0f1147 (git)
  • From 3c4287f62044a90e73a561aa05fc46e62da173da before 4abccfb61f422300be014b8e734c63344306f009 (git)
  • From 3c4287f62044a90e73a561aa05fc46e62da173da before 80417057ac60dd80f4816eb426e4e4a5bf696534 (git)
  • From 3c4287f62044a90e73a561aa05fc46e62da173da before df524a68d9021c1401965d610bb6e42ee5d9611e (git)
  • From 3c4287f62044a90e73a561aa05fc46e62da173da before 0ab3de047808f375a36cd345225572eb3366f3c6 (git)
  • From 3c4287f62044a90e73a561aa05fc46e62da173da before d2768016f091f8a5264076b433fd7c3fabb6eb97 (git)
  • From 3c4287f62044a90e73a561aa05fc46e62da173da before b85e3367a5716ed3662a4fe266525190d2af76df (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/netfilter/nft_set_pipapo.c
Default Status
affected
Versions
Affected
  • 5.6
Unaffected
  • From 0 before 5.6 (semver)
  • From 5.10.250 through 5.10.* (semver)
  • From 5.15.200 through 5.15.* (semver)
  • From 6.1.163 through 6.1.* (semver)
  • From 6.6.124 through 6.6.* (semver)
  • From 6.12.35 through 6.12.* (semver)
  • From 6.15.4 through 6.15.* (semver)
  • From 6.16 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/1fe27f97944017a9d3c5af4d6d95282bff0f1147
N/A
https://git.kernel.org/stable/c/4abccfb61f422300be014b8e734c63344306f009
N/A
https://git.kernel.org/stable/c/80417057ac60dd80f4816eb426e4e4a5bf696534
N/A
https://git.kernel.org/stable/c/df524a68d9021c1401965d610bb6e42ee5d9611e
N/A
https://git.kernel.org/stable/c/0ab3de047808f375a36cd345225572eb3366f3c6
N/A
https://git.kernel.org/stable/c/d2768016f091f8a5264076b433fd7c3fabb6eb97
N/A
https://git.kernel.org/stable/c/b85e3367a5716ed3662a4fe266525190d2af76df
N/A
Hyperlink: https://git.kernel.org/stable/c/1fe27f97944017a9d3c5af4d6d95282bff0f1147
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/4abccfb61f422300be014b8e734c63344306f009
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/80417057ac60dd80f4816eb426e4e4a5bf696534
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/df524a68d9021c1401965d610bb6e42ee5d9611e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/0ab3de047808f375a36cd345225572eb3366f3c6
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d2768016f091f8a5264076b433fd7c3fabb6eb97
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b85e3367a5716ed3662a4fe266525190d2af76df
Resource: N/A
Details not found