CVE-2022-49110

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49110
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49110.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49110
Downstream
Related
Published
2025-02-26T07:00:48Z
Modified
2025-09-23T18:16:22Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

netfilter: conntrack: revisit gc autotuning

as of commit 4608fdfc07e1 ("netfilter: conntrack: collect all entries in one cycle") conntrack gc was changed to run every 2 minutes.

On systems where conntrack hash table is set to large value, most evictions happen from gc worker rather than the packet path due to hash table distribution.

This causes netlink event overflows when events are collected.

This change collects average expiry of scanned entries and reschedules to the average remaining value, within 1 to 60 second interval.

To avoid event overflows, reschedule after each bucket and add a limit for both run time and number of evictions per run.

If more entries have to be evicted, reschedule and restart 1 jiffy into the future.

References

Affected packages