Description
In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink_log: initialize nfgenmsg in NLMSG_DONE terminator

When batching multiple NFLOG messages (inst->qlen > 1), __nfulnl_send()
appends an NLMSG_DONE terminator with sizeof(struct nfgenmsg) payload via
nlmsg_put(), but never initializes the nfgenmsg bytes. The nlmsg_put()
helper only zeroes alignment padding after the payload, not the payload
itself, so four bytes of stale kernel heap data are leaked to userspace
in the NLMSG_DONE message body.

Use nfnl_msg_put() to build the NLMSG_DONE terminator, which initializes
the nfgenmsg payload via nfnl_fill_hdr(), consistent with how
__build_packet_message() already constructs NFULNL_MSG_PACKET headers.
Published: 2026-05-06
Score: 7.0 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linux kernel’s netfilter nfnetlink_log subsystem contains a flaw where the NLMSG_DONE message terminator is appended with an uninitialized nfgenmsg payload. This results in leaking four bytes of stale kernel heap memory to userspace clients that receive NFLOG messages. Based on the description, the leaked bytes appear to come from uninitialized payload data, giving an information‑disclosure weakness. Although the leak is small, the exposed data may contain sensitive information that should remain hidden, such as cryptographic keys, process identifiers, or other memory contents.

Affected Systems

All Linux kernel implementations that include the nfnetlink_log module are potentially affected. This includes standard distributions that ship the default kernel and any custom kernels that enable NFLOG logging. The vulnerability is inherent to any kernel based on the netfilter infrastructure and does not discriminate by vendor.

Risk and Exploitability

The CVSS score is 7.0, and the EPSS score is < 1%, indicating limited publicly known exploitation activity. Attackers likely need to trigger NFLOG messages to receive the NLMSG_DONE payload, which requires either local or network access to the system and the ability to influence netfilter behavior. The likely attack vector is inferred to be the creation of netfilter rules or the sending of packets that activate logging, after which the userspace application receives the uninitialized NLMSG_DONE. The KEV status shows it is not listed, suggesting no confirmed active exploitation yet. Nonetheless, the information disclosure, while small, presents a non‑trivial privacy concern and could facilitate further attacks if the leaked data aids in cracking encryption or manipulating kernel state.

Generated by OpenCVE AI on May 7, 2026 at 01:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel update that includes the commit which replaces nlmsg_put() with nfnl_msg_put() for NLMSG_DONE terminators in nfnetlink_log
  • Disable NFLOG logging temporarily if an immediate kernel update is not possible, thereby preventing the NLMSG_DONE messages from being constructed and sent
  • Restart the system or reload the netfilter modules after updating the kernel to ensure all in‑memory structures are refreshed and the uninitialized payload issue is eliminated

Generated by OpenCVE AI on May 7, 2026 at 01:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-908
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Wed, 06 May 2026 12:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-535

Wed, 06 May 2026 09:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_log: initialize nfgenmsg in NLMSG_DONE terminator When batching multiple NFLOG messages (inst->qlen > 1), __nfulnl_send() appends an NLMSG_DONE terminator with sizeof(struct nfgenmsg) payload via nlmsg_put(), but never initializes the nfgenmsg bytes. The nlmsg_put() helper only zeroes alignment padding after the payload, not the payload itself, so four bytes of stale kernel heap data are leaked to userspace in the NLMSG_DONE message body. Use nfnl_msg_put() to build the NLMSG_DONE terminator, which initializes the nfgenmsg payload via nfnl_fill_hdr(), consistent with how __build_packet_message() already constructs NFULNL_MSG_PACKET headers.
Title netfilter: nfnetlink_log: initialize nfgenmsg in NLMSG_DONE terminator
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T07:40:19.915Z

Reserved: 2026-05-01T14:12:55.983Z

Link: CVE-2026-43085

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T10:16:21.720

Modified: 2026-05-06T13:08:07.970

Link: CVE-2026-43085

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-06T00:00:00Z

Links: CVE-2026-43085 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T01:45:18Z

Weaknesses