First published: Sun Jan 19 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: clamp maximum hashtable size to INT_MAX Use INT_MAX as maximum size for the conntrack hashtable. Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when resizing hashtable because __GFP_NOWARN is unset. See: 0708a0afe291 ("mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls") Note: hashtable resize is only possible from init_netns.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
debian/linux | <=5.10.223-1 | 5.10.234-1 6.1.129-1 6.1.133-1 6.12.21-1 6.12.22-1 |
debian/linux-6.1 | 6.1.129-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-21648 is classified as moderate.
To fix CVE-2025-21648, update your Linux kernel to the latest stable version that contains the patch addressing this vulnerability.
CVE-2025-21648 affects users of the Linux kernel who utilize the conntrack module.
CVE-2025-21648 can lead to potential memory allocation warnings and degrade system stability during hash table resizing.
CVE-2025-21648 is not directly exploitable remotely but may affect systems processing network traffic that rely on conntrack.