CVE-2026-31416
Description
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nfnetlink_log: account for netlink header size
This is a followup to an old bug fix: NLMSG_DONE needs to account for the netlink header size, not just the attribute size.
This can result in a WARN splat + drop of the netlink message, but other than this there are no ill effects.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Linux kernel netfilter nfnetlink_log bug: NLMSG_DONE omits netlink header size, causing WARN splat and message drop.
Vulnerability
The Linux kernel's nfnetlink_log module, part of the netfilter subsystem, contains a flaw in the calculation of the NLMSG_DONE message size. The NLMSG_DONE message is used to signal the end of a netlink multipart message. The bug causes the size calculation to omit the netlink header, resulting in a message that is too small.
Exploitation
When the kernel sends a completed netlink log message to userspace, the incorrectly sized NLMSG_DONE message triggers a WARN splat (kernel warning) and the message is dropped. An attacker can trigger this by generating network traffic that is logged by nfnetlink_log, causing repeated warnings and loss of log messages. No authentication or special privileges are required to trigger the condition, as it occurs during normal packet logging operations.
Impact
The impact is limited to kernel warning messages and dropped netlink messages. There is no risk of code execution, privilege escalation, or data corruption. However, the warning messages may cause unwanted log noise and the loss of log events could impede network monitoring.
Mitigation
Patches have been applied to the Linux kernel stable tree [1]. Users should update their kernel to a version containing this fix to avoid the warning and ensure proper log delivery.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- git.kernel.org/stable/c/09883bf257f4243ed5a1fd35078ec6f0d0f3696anvdPatch
- git.kernel.org/stable/c/4ec216410fac9de83c99177a160ebb8d42fad075nvdPatch
- git.kernel.org/stable/c/607245c4dbb86d9a10dd8388da0fb82170a99b61nvdPatch
- git.kernel.org/stable/c/6b419700e459fbf707ca1543b7c1b57a60fedb73nvdPatch
- git.kernel.org/stable/c/6d52a4a0520a6696bdde51caa11f2d6821cd0c01nvdPatch
- git.kernel.org/stable/c/761b45c661af48da6a065868d59ab1e1f64fd9b6nvdPatch
- git.kernel.org/stable/c/88a8f56e6276f616baad4274c6b8e4683e26e520nvdPatch
- git.kernel.org/stable/c/f08ffa3e1c8e36b6131f69c5eb23700c28cbd262nvdPatch
News mentions
1- Patch Tuesday - April 2026Rapid7 Blog · Apr 14, 2026