CVE-2025-21648
19.01.2025, 11:15
In the Linux kernel, the following vulnerability has been resolved:
netfilter: conntrack: clamp maximum hashtable size to INT_MAX
Use INT_MAX as maximum size for the conntrack hashtable. Otherwise, it
is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when
resizing hashtable because __GFP_NOWARN is unset. See:
0708a0afe291 ("mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls")
Note: hashtable resize is only possible from init_netns.Enginsight| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 4.7.1 ≤ 𝑥 < 5.10.234 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.177 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.125 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.6.72 |
| linux | linux_kernel | 6.7 ≤ 𝑥 < 6.12.10 |
| linux | linux_kernel | 4.7 |
| linux | linux_kernel | 6.13:rc1 |
| linux | linux_kernel | 6.13:rc2 |
| linux | linux_kernel | 6.13:rc3 |
| linux | linux_kernel | 6.13:rc4 |
| linux | linux_kernel | 6.13:rc5 |
| linux | linux_kernel | 6.13:rc6 |
𝑥
= Vulnerable software versions
Debian Releases
References