CVE-2025-21648 Affecting kernel-64k-devel-matched package, versions <0:5.14.0-611.5.1.el9_7


Severity

Recommended
0.0
medium
0
10

Based on AlmaLinux security rating.

Threat Intelligence

EPSS
0.06% (20th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ALMALINUX9-KERNEL64KDEVELMATCHED-14064823
  • published20 Nov 2025
  • disclosed11 Nov 2025

Introduced: 11 Nov 2025

NewCVE-2025-21648  (opens in a new tab)

How to fix?

Upgrade AlmaLinux:9 kernel-64k-devel-matched to version 0:5.14.0-611.5.1.el9_7 or higher.
This issue was patched in ALSA-2025:20518.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-64k-devel-matched package and not the kernel-64k-devel-matched package as distributed by AlmaLinux. See How to fix? for AlmaLinux:9 relevant fixed versions and status.

In the Linux kernel, the following vulnerability has been resolved:

netfilter: conntrack: clamp maximum hashtable size to INT_MAX

Use INT_MAX as maximum size for the conntrack hashtable. Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when resizing hashtable because __GFP_NOWARN is unset. See:

0708a0afe291 ("mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls")

Note: hashtable resize is only possible from init_netns.

CVSS Base Scores

version 3.1