{"vulnerability": "CVE-2025-21648", "sightings": [{"uuid": "408be0c2-9b94-474e-9d64-e580e7c5d828", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21648", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lg3p4neyrv2b", "content": "", "creation_timestamp": "2025-01-19T11:16:08.354156Z"}, {"uuid": "72f01899-e573-41e7-9fa9-445d25137601", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21648", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113854777178287041", "content": "", "creation_timestamp": "2025-01-19T11:27:09.168750Z"}, {"uuid": "4109d424-3ede-4343-9b36-5b70c3ac5bc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21648", "type": "seen", "source": "https://t.me/cvedetector/15826", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21648 - \"Linux Netfilter Conntrack INT_MAXHashtable Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-21648 \nPublished : Jan. 19, 2025, 11:15 a.m. | 35\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnetfilter: conntrack: clamp maximum hashtable size to INT_MAX  \n  \nUse INT_MAX as maximum size for the conntrack hashtable. Otherwise, it  \nis possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when  \nresizing hashtable because __GFP_NOWARN is unset. See:  \n  \n  0708a0afe291 (\"mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls\")  \n  \nNote: hashtable resize is only possible from init_netns. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-19T13:07:09.000000Z"}, {"uuid": "f31f52a3-410d-4f28-b9f3-e1124461686f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-21648", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2319", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21648\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: conntrack: clamp maximum hashtable size to INT_MAX\n\nUse INT_MAX as maximum size for the conntrack hashtable. Otherwise, it\nis possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when\nresizing hashtable because __GFP_NOWARN is unset. See:\n\n  0708a0afe291 (\"mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls\")\n\nNote: hashtable resize is only possible from init_netns.\n\ud83d\udccf Published: 2025-01-19T10:18:05.700Z\n\ud83d\udccf Modified: 2025-01-19T10:18:05.700Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/5552b4fd44be3393b930434a7845d8d95a2a3c33\n2. https://git.kernel.org/stable/c/d5807dd1328bbc86e059c5de80d1bbee9d58ca3d\n3. https://git.kernel.org/stable/c/f559357d035877b9d0dcd273e0ff83e18e1d46aa\n4. https://git.kernel.org/stable/c/b541ba7d1f5a5b7b3e2e22dc9e40e18a7d6dbc13", "creation_timestamp": "2025-01-19T10:58:21.000000Z"}, {"uuid": "2e548fa8-98a1-4aea-8f77-77518ed9f2e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2025-21648", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}]}