Description
In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_ct: drop pending enqueued packets on removal

Packets sitting in nfqueue might hold a reference to:

- templates that specify the conntrack zone, because a percpu area is
used and module removal is possible.
- conntrack timeout policies and helper, where object removal leave
a stale reference.

Since these objects can just go away, drop enqueued packets to avoid
stale reference to them.

If there is a need for finer grain removal, this logic can be revisited
to make selective packet drop upon dependencies.
Published: 2026-05-05
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the Linux kernel’s netfilter nft_ct component. When the nft_ct module is unloaded while packets are still queued, the kernel can be left holding stale references to conntrack templates, timeout policies, or helper objects. Based on the description, it is inferred that this improper cleanup can cause a use‑after‑free or dereference of a dangling pointer, potentially leading to a kernel crash and denial of service. Based on the description, it is inferred that an attacker with the ability to unload the module could trigger this condition.

Affected Systems

Based on the description, it is inferred that all Linux kernel versions that compile the nft_ct module without the patch are potentially affected. Systems that load nft_ct (the connection‑tracking component of nftables) and may unload it—for example, during module reloads or by a privileged user—are at risk. The exact kernel versions are not specified in the advisory.

Risk and Exploitability

The severity is high because a kernel crash equates to a full denial of service. No EPSS score is available, which indicates that public exploitation has not been documented, yet based on the description it is inferred that the condition can be exploited by a local privileged attacker who can unload kernel modules. The vulnerability is not listed in the CISA KEV catalog, but it remains a critical issue due to the nature of kernel pointer misuse.

Generated by OpenCVE AI on May 5, 2026 at 17:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that incorporates the patch for nft_ct
  • If an upgrade is not possible, disable or unload the nft_ct kernel module when it is not required
  • Restrict module unloading permissions so that only authorized users can unload kernel modules
  • Monitor system logs for kernel crash events or nfqueue related errors, and respond promptly if they occur

Generated by OpenCVE AI on May 5, 2026 at 17:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Tue, 05 May 2026 16:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_ct: drop pending enqueued packets on removal Packets sitting in nfqueue might hold a reference to: - templates that specify the conntrack zone, because a percpu area is used and module removal is possible. - conntrack timeout policies and helper, where object removal leave a stale reference. Since these objects can just go away, drop enqueued packets to avoid stale reference to them. If there is a need for finer grain removal, this logic can be revisited to make selective packet drop upon dependencies.
Title netfilter: nft_ct: drop pending enqueued packets on removal
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-05T15:17:26.393Z

Reserved: 2026-05-01T14:12:55.981Z

Link: CVE-2026-43060

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-05T16:16:15.050

Modified: 2026-05-05T16:16:15.050

Link: CVE-2026-43060

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T18:00:13Z

Weaknesses