Impact
The vulnerability resides in the nfnetlink_log subsystem of the Linux kernel. The code handling NLMSG_DONE messages only accounts for the size of the netlink attributes, overlooking the full netlink header length. When a message arrives that contains an unexpected or larger header, the kernel generates a WARN splat and drops the message. The bug does not lead to code execution, data corruption, or other serious effects; it merely causes a log entry to be lost and a warning to appear.
Affected Systems
Any Linux system running a kernel version that has not yet incorporated the header‑size accounting patch is affected. All distributions that ship the unpatched kernel are at risk. The patch is included in recent kernel commits, so systems that have updated beyond that point are safe.
Risk and Exploitability
The CVSS score of 5.5 reflects moderate severity, while an EPSS score of less than one percent indicates a low likelihood of observed exploitation. No KISA KEV listing further suggests limited real‑world activity. Attacking this flaw would require the ability to craft and send netlink messages, a capability typically confined to local or privileged users. On successful exploitation, an attacker could repeatedly trigger WARN splat messages and cause legitimate netlink traffic to be discarded, which could disrupt logging or monitoring flows but does not compromise system integrity or confidentiality.
OpenCVE Enrichment