Description
In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink_queue: make hash table per queue

Sharing a global hash table among all queues is tempting, but
it can cause crash:

BUG: KASAN: slab-use-after-free in nfqnl_recv_verdict+0x11ac/0x15e0 [nfnetlink_queue]
[..]
nfqnl_recv_verdict+0x11ac/0x15e0 [nfnetlink_queue]
nfnetlink_rcv_msg+0x46a/0x930
kmem_cache_alloc_node_noprof+0x11e/0x450

struct nf_queue_entry is freed via kfree, but parallel cpu can still
encounter such an nf_queue_entry when walking the list.

Alternative fix is to free the nf_queue_entry via kfree_rcu() instead,
but as we have to alloc/free for each skb this will cause more mem
pressure.
Published: 2026-05-06
Score: 7.0 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linux kernel’s nfnetlink_queue subsystem has a use‑after‑free flaw: a nf_queue_entry is freed with kfree while another CPU thread still traverses the list, resulting in a kernel panic as evidenced by the KASAN trace in nfqnl_recv_verdict. This memory corruption can abruptly terminate kernel execution.

Affected Systems

All Linux kernel installations that ship the nfnetlink_queue module and have not applied the per‑queue hash table patch are affected. The advisory does not enumerate specific kernel versions, so every kernel prior to the fix is considered vulnerable.

Risk and Exploitability

The vulnerability is a high‑impact memory‑corruption bug that can cause a kernel crash. The CVSS score of 7.0 indicates moderate to high severity, and the EPSS score of < 1% shows low likelihood of exploitation; it is not listed in CISA KEV. The likely attack vector requires the ability to send crafted netlink messages to the nfnetlink_queue interface, so systems exposed to untrusted network traffic on this interface are at risk.

Generated by OpenCVE AI on May 7, 2026 at 04:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel update that implements the per‑queue hash table fix to eliminate the use‑after‑free condition
  • If a kernel update is not yet available, temporarily unload the nfnetlink_queue module with "rmmod nfnetlink_queue" to prevent the vulnerable code from executing
  • Monitor kernel logs for KASAN or Oops messages and reboot immediately if a crash occurs

Generated by OpenCVE AI on May 7, 2026 at 04:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 02:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-362
CWE-416

Thu, 07 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-364
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Wed, 06 May 2026 13:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-362
CWE-416

Wed, 06 May 2026 09:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_queue: make hash table per queue Sharing a global hash table among all queues is tempting, but it can cause crash: BUG: KASAN: slab-use-after-free in nfqnl_recv_verdict+0x11ac/0x15e0 [nfnetlink_queue] [..] nfqnl_recv_verdict+0x11ac/0x15e0 [nfnetlink_queue] nfnetlink_rcv_msg+0x46a/0x930 kmem_cache_alloc_node_noprof+0x11e/0x450 struct nf_queue_entry is freed via kfree, but parallel cpu can still encounter such an nf_queue_entry when walking the list. Alternative fix is to free the nf_queue_entry via kfree_rcu() instead, but as we have to alloc/free for each skb this will cause more mem pressure.
Title netfilter: nfnetlink_queue: make hash table per queue
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T07:40:19.253Z

Reserved: 2026-05-01T14:12:55.983Z

Link: CVE-2026-43084

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T10:16:21.610

Modified: 2026-05-06T13:08:07.970

Link: CVE-2026-43084

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-06T00:00:00Z

Links: CVE-2026-43084 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T05:00:12Z

Weaknesses