netfilter: nfnetlink_log: account for netlink header size

Summary

CVECVE-2026-31416
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-04-13 14:16:10 UTC
Updated2026-04-18 09:16:31 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_log: account for netlink header size This is a followup to an old bug fix: NLMSG_DONE needs to account for the netlink header size, not just the attribute size. This can result in a WARN splat + drop of the netlink message, but other than this there are no ill effects.

Risk And Classification

EPSS: 0.000240000 probability, percentile 0.066100000 (date 2026-04-18)

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected 9dfa1dfe4d5e5e66a991321ab08afe69759d797a 4ec216410fac9de83c99177a160ebb8d42fad075 git Not specified
CNA Linux Linux affected 9dfa1dfe4d5e5e66a991321ab08afe69759d797a 09883bf257f4243ed5a1fd35078ec6f0d0f3696a git Not specified
CNA Linux Linux affected 9dfa1dfe4d5e5e66a991321ab08afe69759d797a 761b45c661af48da6a065868d59ab1e1f64fd9b6 git Not specified
CNA Linux Linux affected 9dfa1dfe4d5e5e66a991321ab08afe69759d797a 607245c4dbb86d9a10dd8388da0fb82170a99b61 git Not specified
CNA Linux Linux affected 9dfa1dfe4d5e5e66a991321ab08afe69759d797a 6b419700e459fbf707ca1543b7c1b57a60fedb73 git Not specified
CNA Linux Linux affected 9dfa1dfe4d5e5e66a991321ab08afe69759d797a 88a8f56e6276f616baad4274c6b8e4683e26e520 git Not specified
CNA Linux Linux affected 9dfa1dfe4d5e5e66a991321ab08afe69759d797a f08ffa3e1c8e36b6131f69c5eb23700c28cbd262 git Not specified
CNA Linux Linux affected 9dfa1dfe4d5e5e66a991321ab08afe69759d797a 6d52a4a0520a6696bdde51caa11f2d6821cd0c01 git Not specified
CNA Linux Linux affected 3a758a2b78da2f49f7165678faf999e946a0c4b5 git Not specified
CNA Linux Linux affected 131172845aa2c804ffa9423455aee585061ea35e git Not specified
CNA Linux Linux affected b1fef6b81871a396f3b8702077333e769673c87b git Not specified
CNA Linux Linux affected add9183d993c12fb61ce0a674a424341d5be5b36 git Not specified
CNA Linux Linux affected 3.18 Not specified
CNA Linux Linux unaffected 3.18 semver Not specified
CNA Linux Linux unaffected 5.10.253 5.10.* semver Not specified
CNA Linux Linux unaffected 5.15.203 5.15.* semver Not specified
CNA Linux Linux unaffected 6.1.168 6.1.* semver Not specified
CNA Linux Linux unaffected 6.6.134 6.6.* semver Not specified
CNA Linux Linux unaffected 6.12.81 6.12.* semver Not specified
CNA Linux Linux unaffected 6.18.22 6.18.* semver Not specified
CNA Linux Linux unaffected 6.19.12 6.19.* semver Not specified
CNA Linux Linux unaffected 7.0 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/761b45c661af48da6a065868d59ab1e1f64fd9b6 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/88a8f56e6276f616baad4274c6b8e4683e26e520 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/6d52a4a0520a6696bdde51caa11f2d6821cd0c01 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/4ec216410fac9de83c99177a160ebb8d42fad075 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/09883bf257f4243ed5a1fd35078ec6f0d0f3696a 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/f08ffa3e1c8e36b6131f69c5eb23700c28cbd262 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/6b419700e459fbf707ca1543b7c1b57a60fedb73 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/607245c4dbb86d9a10dd8388da0fb82170a99b61 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report