CVE-2026-23139
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_conncount: update last_gc only when GC has been performed
Currently last_gc is being updated everytime a new connection is
tracked, that means that it is updated even if a GC wasn't performed.
With a sufficiently high packet rate, it is possible to always bypass
the GC, causing the list to grow infinitely.
Update the last_gc value only when a GC has been actually performed.
netfilter: nf_conncount: update last_gc only when GC has been performed
Currently last_gc is being updated everytime a new connection is
tracked, that means that it is updated even if a GC wasn't performed.
With a sufficiently high packet rate, it is possible to always bypass
the GC, causing the list to grow infinitely.
Update the last_gc value only when a GC has been actually performed.
Vendor
Product
CWE
Yayın Tarihi
2026-02-14 16:15:53
Güncelleme
2026-04-03 14:16:24
Source Identifier
416baaa9-dc9f-4396-8d5f-8c081fb06d67
KEV Date Added
-
Kategoriler
Referanslar
https://git.kernel.org/stable/c/26a82dce2beee39c43c109d9647e16f49cb02a35
https://git.kernel.org/stable/c/2c7c71113ed6d3e2f3aca4c088f22283016ff34f
https://git.kernel.org/stable/c/3cd717359e56f82f06cbf8279b47a7d79880c6f3
https://git.kernel.org/stable/c/7811ba452402d58628e68faedf38745b3d485e3c
https://git.kernel.org/stable/c/8bdafdf4900040a81422056cabe5e00a37bd101a
https://git.kernel.org/stable/c/9f45588993d7f115280fc726119ca86fba32a811
https://git.kernel.org/stable/c/c4cde57c8affdcca5bcff53a1047e15d268bdca1