Description
In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conncount: update last_gc only when GC has been performed

Currently last_gc is being updated everytime a new connection is
tracked, that means that it is updated even if a GC wasn't performed.
With a sufficiently high packet rate, it is possible to always bypass
the GC, causing the list to grow infinitely.

Update the last_gc value only when a GC has been actually performed.
Published: 2026-02-14
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

The Linux kernel module nf_conncount incorrectly updates the last_gc counter on each new tracked connection instead of only after a garbage collection cycle. This oversight allows an attacker to sustain a high packet or connection rate that keeps the GC from running. By continually bypassing the GC, the connection table expands unbounded, eventually exhausting kernel memory and degrading system performance, potentially causing a denial of service.

Affected Systems

The flaw is present in the nf_conncount implementation of the Linux kernel, which is part of the netfilter subsystem. It was identified in kernel version 6.19 release candidates 1 through 4, and the vulnerability description indicates the issue exists in all builds that include the same nf_conncount code without the recent fix. Consequently, systems running these kernel versions—or any kernel builds that have not yet incorporated the fix—are susceptible.

Risk and Exploitability

The CVSS score of 7.5 reflects a high severity due to the potential for direct resource depletion via network traffic. EPSS indicates a very low probability of exploitation (<1%), and the vulnerability is not listed in CISA’s KEV catalog. Nevertheless, the attack would require an adversary able to send a sustained high‑rate stream of packets that establish new connections, which could be achieved by an external attacker with network access to the target. Successful exploitation would result in memory exhaustion and system slowdown or crash, with the attacker not gaining elevated privileges.

Generated by OpenCVE AI on April 15, 2026 at 20:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a release that contains the nf_conncount last_gc fix, such as the latest official distribution update that includes the patch applied in kernel v6.19 final and later releases.
  • If a kernel update is not immediately available, disable the nf_conncount module or reduce its activity by applying rate limiting on nf_conntrack connections using netfilter or iptables rules to limit the number of connections per source address.
  • Monitor system memory usage and the nf_conntrack table size for abnormal growth, and consider temporarily swapping to a kernel configuration with a smaller connection tracking table until the fix can be deployed.

Generated by OpenCVE AI on April 15, 2026 at 20:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400

Fri, 03 Apr 2026 14:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Tue, 17 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Tue, 17 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Important


Sat, 14 Feb 2026 15:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conncount: update last_gc only when GC has been performed Currently last_gc is being updated everytime a new connection is tracked, that means that it is updated even if a GC wasn't performed. With a sufficiently high packet rate, it is possible to always bypass the GC, causing the list to grow infinitely. Update the last_gc value only when a GC has been actually performed.
Title netfilter: nf_conncount: update last_gc only when GC has been performed
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-03T13:32:04.006Z

Reserved: 2026-01-13T15:37:45.972Z

Link: CVE-2026-23139

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2026-02-14T16:15:53.950

Modified: 2026-04-03T14:16:24.440

Link: CVE-2026-23139

cve-icon Redhat

Severity : Important

Publid Date: 2026-02-14T00:00:00Z

Links: CVE-2026-23139 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T20:45:06Z

Weaknesses