Description
In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: reject immediate NF_QUEUE verdict

nft_queue is always used from userspace nftables to deliver the NF_QUEUE
verdict. Immediately emitting an NF_QUEUE verdict is never used by the
userspace nft tools, so reject immediate NF_QUEUE verdicts.

The arp family does not provide queue support, but such an immediate
verdict is still reachable. Globally reject NF_QUEUE immediate verdicts
to address this issue.
Published: 2026-05-01
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linux kernel’s netfilter nf_tables module previously permitted an immediate NF_QUEUE verdict, a condition that is never used by user‑space nftables tools. The vulnerability arises because such a verdict could be manually constructed or triggered, leading to packets being handled out of the intended queueing workflow, which could in turn cause unexpected packet filtering or loss. The patch explicitly rejects all immediate NF_QUEUE verdicts, restoring the correct queuing logic and preventing any premature packet delivery.

Affected Systems

All Linux kernel builds that predate the commit introducing the rejection logic are potentially affected. The CNA vendors list only "Linux:Linux" and no explicit version range is provided, so any kernel not yet updated to include the nf_tables immediate NF_QUEUE verdict fix remains vulnerable.

Risk and Exploitability

The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, indicating that no public exploitation data is current. The CVSS score is 5.5, indicating medium severity. Based on the description, it is inferred that a local or elevated process capable of manipulating nftables rules could trigger the flaw. Given the lack of exploitation references and the absence of a high EPSS score, the overall risk appears low to moderate, but it remains prudent to address it promptly.

Generated by OpenCVE AI on May 2, 2026 at 07:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a release that contains the nf_tables immediate NF_QUEUE verdict fix.
  • Audit current nftables configurations and remove any rules that invoke an immediate NF_QUEUE verdict.
  • Restrict nftables rule modification privileges to trusted administrators and enforce a least‑privilege model for rule changes.

Generated by OpenCVE AI on May 2, 2026 at 07:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Sat, 02 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-115
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject immediate NF_QUEUE verdict nft_queue is always used from userspace nftables to deliver the NF_QUEUE verdict. Immediately emitting an NF_QUEUE verdict is never used by the userspace nft tools, so reject immediate NF_QUEUE verdicts. The arp family does not provide queue support, but such an immediate verdict is still reachable. Globally reject NF_QUEUE immediate verdicts to address this issue.
Title netfilter: nf_tables: reject immediate NF_QUEUE verdict
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-01T14:15:26.424Z

Reserved: 2026-05-01T14:12:55.975Z

Link: CVE-2026-43024

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:46.760

Modified: 2026-05-01T15:24:14.893

Link: CVE-2026-43024

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-01T00:00:00Z

Links: CVE-2026-43024 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T07:15:16Z

Weaknesses