CVE-2022-49110
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
23/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: conntrack: revisit gc autotuning<br />
<br />
as of commit 4608fdfc07e1<br />
("netfilter: conntrack: collect all entries in one cycle")<br />
conntrack gc was changed to run every 2 minutes.<br />
<br />
On systems where conntrack hash table is set to large value, most evictions<br />
happen from gc worker rather than the packet path due to hash table<br />
distribution.<br />
<br />
This causes netlink event overflows when events are collected.<br />
<br />
This change collects average expiry of scanned entries and<br />
reschedules to the average remaining value, within 1 to 60 second interval.<br />
<br />
To avoid event overflows, reschedule after each bucket and add a<br />
limit for both run time and number of evictions per run.<br />
<br />
If more entries have to be evicted, reschedule and restart 1 jiffy<br />
into the future.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.34 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.16.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.17 (including) | 5.17.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



