Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2428 articles · 111859 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-31416EXPLOITEDPATCHED
linux · linux kernel

netfilter: nfnetlink_log: account for netlink header size

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_log: account for netlink header size This is a followup to an old bug fix: NLMSG_DONE needs to account for the netlink header size, not just the attribute size. This can result in a WARN splat + drop of the netlink message, but other than this there are no ill effects.

Affected Products

VendorProductVersions
linuxlinux kernel9dfa1dfe4d5e5e66a991321ab08afe69759d797a, 9dfa1dfe4d5e5e66a991321ab08afe69759d797a, 9dfa1dfe4d5e5e66a991321ab08afe69759d797a, 9dfa1dfe4d5e5e66a991321ab08afe69759d797a, 9dfa1dfe4d5e5e66a991321ab08afe69759d797a, 9dfa1dfe4d5e5e66a991321ab08afe69759d797a, 9dfa1dfe4d5e5e66a991321ab08afe69759d797a, 9dfa1dfe4d5e5e66a991321ab08afe69759d797a, 3a758a2b78da2f49f7165678faf999e946a0c4b5, 131172845aa2c804ffa9423455aee585061ea35e, b1fef6b81871a396f3b8702077333e769673c87b, add9183d993c12fb61ce0a674a424341d5be5b36, 3.18

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
linuxlinuxmitre_affected90%
open sourceopen source linux kernelcert_advisory90%

References

  • https://git.kernel.org/stable/c/4ec216410fac9de83c99177a160ebb8d42fad075
  • https://git.kernel.org/stable/c/09883bf257f4243ed5a1fd35078ec6f0d0f3696a
  • https://git.kernel.org/stable/c/761b45c661af48da6a065868d59ab1e1f64fd9b6
  • https://git.kernel.org/stable/c/607245c4dbb86d9a10dd8388da0fb82170a99b61
  • https://git.kernel.org/stable/c/6b419700e459fbf707ca1543b7c1b57a60fedb73
  • https://git.kernel.org/stable/c/88a8f56e6276f616baad4274c6b8e4683e26e520
  • https://git.kernel.org/stable/c/f08ffa3e1c8e36b6131f69c5eb23700c28cbd262
  • https://git.kernel.org/stable/c/6d52a4a0520a6696bdde51caa11f2d6821cd0c01

Related News (5 articles)

Tier C
Rapid7 Blog5d ago
Patch Tuesday - April 2026
→ No new info (linked only)
Tier B
BSI Advisories6d ago
[NEU] [mittel] Linux Kernel: Mehrere Schwachstellen
→ No new info (linked only)
Tier A
Microsoft MSRC6d ago
CVE-2026-31416 netfilter: nfnetlink_log: account for netlink header size
→ No new info (linked only)
Tier C
VulDB7d ago
CVE-2026-31416 | Linux Kernel up to 6.1.167/6.6.133/6.12.80/6.18.21/6.19.11 Netlink Message nfnetlink_log privilege escalation
→ No new info (linked only)
Tier C
Linux Kernel CVEs7d ago
CVE-2026-31416: netfilter: nfnetlink_log: account for netlink header size
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
761b45c661af48da6a065868d59ab1e1f64fd9b6607245c4dbb86d9a10dd8388da0fb82170a99b616b419700e459fbf707ca1543b7c1b57a60fedb7388a8f56e6276f616baad4274c6b8e4683e26e520f08ffa3e1c8e36b6131f69c5eb23700c28cbd2626d52a4a0520a6696bdde51caa11f2d6821cd0c0106.1.1686.6.1346.12.816.18.226.19.127.0
PublishedApr 13, 2026
Last enriched5d agov4
Trending Score27
Source articles5
Independent5
Info Completeness8/14
Missing: cvss, epss, cwe, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-31430EXP
X.509: Fix out-of-bounds access when parsing extensions
Trending: 64
HIGHCVE-2026-23400EXP
rust_binder: call set_notification_done() without proc lock
Trending: 63
NONECVE-2026-31429
net: skb: fix cross-cache free of KFENCE-allocated skb head
Trending: 35
NONECVE-2026-23398EXP
icmp: fix NULL pointer dereference in icmp_tag_validation()
Trending: 29
NONECVE-2026-31427EXP
netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp
Trending: 24

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 13, 2026
Discovered by ZDM
Apr 13, 2026
Updated: affectedVersions
Apr 13, 2026
Updated: description, affectedVersions, severity, activelyExploited
Apr 13, 2026
Updated: exploitAvailable
Apr 14, 2026
Actively Exploited
Apr 18, 2026
Exploit Available
Apr 18, 2026
Patch Available
Apr 18, 2026

Version History

v4
Last enriched 5d ago
v4Tier C5d ago

Updated exploit availability to true and set patch available to null.

exploitAvailable
via Rapid7 Blog
v3Tier C6d ago

Updated description with critical details, changed severity to CRITICAL, and updated affected versions.

descriptionaffectedVersionsseverityactivelyExploited
via VulDB
v2Tier C7d ago

Added CVE-2026-31416, updated severity to LOW, and included new affected versions.

affectedVersions
via Linux Kernel CVEs
v17d ago

Initial creation