Description
In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink_log: account for netlink header size

This is a followup to an old bug fix: NLMSG_DONE needs to account
for the netlink header size, not just the attribute size.

This can result in a WARN splat + drop of the netlink message,
but other than this there are no ill effects.
Published: 2026-04-13
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Netlink message drop
Action: Kernel Update
AI Analysis

Impact

The vulnerability resides in the nfnetlink_log subsystem of the Linux kernel. The code handling NLMSG_DONE messages only accounts for the size of the netlink attributes, overlooking the full netlink header length. When a message arrives that contains an unexpected or larger header, the kernel generates a WARN splat and drops the message. The bug does not lead to code execution, data corruption, or other serious effects; it merely causes a log entry to be lost and a warning to appear.

Affected Systems

Any Linux system running a kernel version that has not yet incorporated the header‑size accounting patch is affected. All distributions that ship the unpatched kernel are at risk. The patch is included in recent kernel commits, so systems that have updated beyond that point are safe.

Risk and Exploitability

The CVSS score of 5.5 reflects moderate severity, while an EPSS score of less than one percent indicates a low likelihood of observed exploitation. No KISA KEV listing further suggests limited real‑world activity. Attacking this flaw would require the ability to craft and send netlink messages, a capability typically confined to local or privileged users. On successful exploitation, an attacker could repeatedly trigger WARN splat messages and cause legitimate netlink traffic to be discarded, which could disrupt logging or monitoring flows but does not compromise system integrity or confidentiality.

Generated by OpenCVE AI on April 14, 2026 at 14:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that incorporates the netlink header size fix
  • Verify the current kernel release using 'uname -r' and confirm it includes the latest nfnetlink_log patch
  • If an immediate upgrade is not possible, disable or reduce nfnetlink logging via sysctl parameters to minimize impact of dropped messages
  • Monitor system logs for WARN splat entries that may indicate the vulnerability is in effect

Generated by OpenCVE AI on April 14, 2026 at 14:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119

Tue, 14 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Mon, 13 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_log: account for netlink header size This is a followup to an old bug fix: NLMSG_DONE needs to account for the netlink header size, not just the attribute size. This can result in a WARN splat + drop of the netlink message, but other than this there are no ill effects.
Title netfilter: nfnetlink_log: account for netlink header size
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T13:21:03.974Z

Reserved: 2026-03-09T15:48:24.087Z

Link: CVE-2026-31416

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-13T14:16:10.907

Modified: 2026-04-13T15:01:43.663

Link: CVE-2026-31416

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-13T00:00:00Z

Links: CVE-2026-31416 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:34:32Z

Weaknesses