CVE-2025-21648

In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: clamp maximum hashtable size to INT_MAX Use INT_MAX as maximum size for the conntrack hashtable. Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when resizing hashtable because __GFP_NOWARN is unset. See: 0708a0afe291 ("mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls") Note: hashtable resize is only possible from init_netns.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.7:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*

History

16 Oct 2025, 19:20

Type Values Removed Values Added
CWE NVD-CWE-Other
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/5552b4fd44be3393b930434a7845d8d95a2a3c33 - () https://git.kernel.org/stable/c/5552b4fd44be3393b930434a7845d8d95a2a3c33 - Patch
References () https://git.kernel.org/stable/c/a965f7f0ea3ae61b9165bed619d5d6da02c75f80 - () https://git.kernel.org/stable/c/a965f7f0ea3ae61b9165bed619d5d6da02c75f80 - Patch
References () https://git.kernel.org/stable/c/b1b2353d768f1b80cd7fe045a70adee576b9b338 - () https://git.kernel.org/stable/c/b1b2353d768f1b80cd7fe045a70adee576b9b338 - Patch
References () https://git.kernel.org/stable/c/b541ba7d1f5a5b7b3e2e22dc9e40e18a7d6dbc13 - () https://git.kernel.org/stable/c/b541ba7d1f5a5b7b3e2e22dc9e40e18a7d6dbc13 - Patch
References () https://git.kernel.org/stable/c/d5807dd1328bbc86e059c5de80d1bbee9d58ca3d - () https://git.kernel.org/stable/c/d5807dd1328bbc86e059c5de80d1bbee9d58ca3d - Patch
References () https://git.kernel.org/stable/c/f559357d035877b9d0dcd273e0ff83e18e1d46aa - () https://git.kernel.org/stable/c/f559357d035877b9d0dcd273e0ff83e18e1d46aa - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.7:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*

02 Feb 2025, 11:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/a965f7f0ea3ae61b9165bed619d5d6da02c75f80 -

23 Jan 2025, 17:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: conntrack: fijar el tamaño máximo de la tabla hash a INT_MAX Utilice INT_MAX como tamaño máximo para la tabla hash de conntrack. De lo contrario, es posible alcanzar WARN_ON_ONCE en __kvmalloc_node_noprof() al cambiar el tamaño de la tabla hash porque __GFP_NOWARN no está configurado. Consulte: 0708a0afe291 ("mm: Considere el indicador __GFP_NOWARN para llamadas kvmalloc() de gran tamaño") Nota: el cambio de tamaño de la tabla hash solo es posible desde init_netns.
References
  • () https://git.kernel.org/stable/c/b1b2353d768f1b80cd7fe045a70adee576b9b338 -

19 Jan 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-19 11:15

Updated : 2025-10-16 19:20


NVD link : CVE-2025-21648

Mitre link : CVE-2025-21648

CVE.ORG link : CVE-2025-21648


JSON object : View

Products Affected

linux

  • linux_kernel