
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49110 affects the Linux kernel's netfilter connection tracking (conntrack) subsystem. The vulnerability was discovered when it was found that systems with large conntrack hash tables experienced issues with connection tracking garbage collection, leading to potential netlink event overflows (Kernel Commit).
The vulnerability stems from a design issue in the conntrack garbage collection (GC) mechanism. Prior to the fix, the GC worker was configured to run every 2 minutes, which proved problematic for systems with large hash tables. The issue caused most evictions to occur from the GC worker rather than the packet path due to hash table distribution, resulting in netlink event overflows during event collection (Kernel Commit).
The primary impact of this vulnerability is the potential for netlink event overflows when connection tracking events are collected. This could affect network connectivity and system performance on systems with large connection tracking hash tables (Kernel Commit).
The issue was addressed by implementing a more sophisticated garbage collection mechanism that collects average expiry of scanned entries and reschedules to the average remaining value within a 1 to 60 second interval. The fix also includes limits for both run time and number of evictions per run, with automatic rescheduling if more entries need to be evicted (Kernel Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."