VYPR
Medium severity5.5NVD Advisory· Published Apr 13, 2026· Updated May 20, 2026

CVE-2026-31416

CVE-2026-31416

Description

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink_log: account for netlink header size

This is a followup to an old bug fix: NLMSG_DONE needs to account for the netlink header size, not just the attribute size.

This can result in a WARN splat + drop of the netlink message, but other than this there are no ill effects.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Linux kernel netfilter nfnetlink_log bug: NLMSG_DONE omits netlink header size, causing WARN splat and message drop.

Vulnerability

The Linux kernel's nfnetlink_log module, part of the netfilter subsystem, contains a flaw in the calculation of the NLMSG_DONE message size. The NLMSG_DONE message is used to signal the end of a netlink multipart message. The bug causes the size calculation to omit the netlink header, resulting in a message that is too small.

Exploitation

When the kernel sends a completed netlink log message to userspace, the incorrectly sized NLMSG_DONE message triggers a WARN splat (kernel warning) and the message is dropped. An attacker can trigger this by generating network traffic that is logged by nfnetlink_log, causing repeated warnings and loss of log messages. No authentication or special privileges are required to trigger the condition, as it occurs during normal packet logging operations.

Impact

The impact is limited to kernel warning messages and dropped netlink messages. There is no risk of code execution, privilege escalation, or data corruption. However, the warning messages may cause unwanted log noise and the loss of log events could impede network monitoring.

Mitigation

Patches have been applied to the Linux kernel stable tree [1]. Users should update their kernel to a version containing this fix to avoid the warning and ensure proper log delivery.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

1