CVE-2026-23139
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/02/2026
Last modified:
17/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: nf_conncount: update last_gc only when GC has been performed<br />
<br />
Currently last_gc is being updated everytime a new connection is<br />
tracked, that means that it is updated even if a GC wasn&#39;t performed.<br />
With a sufficiently high packet rate, it is possible to always bypass<br />
the GC, causing the list to grow infinitely.<br />
<br />
Update the last_gc value only when a GC has been actually performed.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.19 (including) | 6.1.161 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.121 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.66 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/26a82dce2beee39c43c109d9647e16f49cb02a35
- https://git.kernel.org/stable/c/2c7c71113ed6d3e2f3aca4c088f22283016ff34f
- https://git.kernel.org/stable/c/3cd717359e56f82f06cbf8279b47a7d79880c6f3
- https://git.kernel.org/stable/c/7811ba452402d58628e68faedf38745b3d485e3c
- https://git.kernel.org/stable/c/8bdafdf4900040a81422056cabe5e00a37bd101a
- https://git.kernel.org/stable/c/9f45588993d7f115280fc726119ca86fba32a811
- https://git.kernel.org/stable/c/c4cde57c8affdcca5bcff53a1047e15d268bdca1



