In the Linux kernel, the following vulnerability has been resolved:
netfilter: conntrack: clamp maximum hashtable size to INT_MAX
Use INT_MAX as maximum size for the conntrack hashtable. Otherwise, it
is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when
resizing hashtable because __GFP_NOWARN is unset. See:
0708a0afe291 ("mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls")
Note: hashtable resize is only possible from init_netns.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 01:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-789 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Sun, 02 Feb 2025 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 23 Jan 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 20 Jan 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Sun, 19 Jan 2025 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: clamp maximum hashtable size to INT_MAX Use INT_MAX as maximum size for the conntrack hashtable. Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when resizing hashtable because __GFP_NOWARN is unset. See: 0708a0afe291 ("mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls") Note: hashtable resize is only possible from init_netns. | |
Title | netfilter: conntrack: clamp maximum hashtable size to INT_MAX | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-02-02T10:16:08.356Z
Reserved: 2024-12-29T08:45:45.728Z
Link: CVE-2025-21648

No data.

Status : Awaiting Analysis
Published: 2025-01-19T11:15:10.410
Modified: 2025-02-02T11:15:15.433
Link: CVE-2025-21648
