-

CVE-2026-43451

netfilter: nfnetlink_queue: fix entry leak in bridge verdict error path

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink_queue: fix entry leak in bridge verdict error path

nfqnl_recv_verdict() calls find_dequeue_entry() to remove the queue
entry from the queue data structures, taking ownership of the entry.
For PF_BRIDGE packets, it then calls nfqa_parse_bridge() to parse VLAN
attributes.  If nfqa_parse_bridge() returns an error (e.g. NFQA_VLAN
present but NFQA_VLAN_TCI missing), the function returns immediately
without freeing the dequeued entry or its sk_buff.

This leaks the nf_queue_entry, its associated sk_buff, and all held
references (net_device refcounts, struct net refcount).  Repeated
triggering exhausts kernel memory.

Fix this by dropping the entry via nfqnl_reinject() with NF_DROP verdict
on the error path, consistent with other error handling in this file.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 8d45ff22f1b43249f0cf1baafe0262ca10d1666e
Version < a907bea273b60d3e604ec4e8e1f6c49954805794
Status affected
Version 8d45ff22f1b43249f0cf1baafe0262ca10d1666e
Version < 0b18d1b834ab5a5009be70b530f978d7989e445b
Status affected
Version 8d45ff22f1b43249f0cf1baafe0262ca10d1666e
Version < b38d2b4603fd3dda24eb8b3dd81c18a0930be97b
Status affected
Version 8d45ff22f1b43249f0cf1baafe0262ca10d1666e
Version < 47b1c5d1b0944aa88299f55a846fabaefc756982
Status affected
Version 8d45ff22f1b43249f0cf1baafe0262ca10d1666e
Version < cf4a4df38d1747e06fc54f9879bd7a6f4178032f
Status affected
Version 8d45ff22f1b43249f0cf1baafe0262ca10d1666e
Version < 9853d94b82d303fc4ac37d592a23a154096ecd41
Status affected
Version 8d45ff22f1b43249f0cf1baafe0262ca10d1666e
Version < 208669df703a25a601f45822b10c413f258bf275
Status affected
Version 8d45ff22f1b43249f0cf1baafe0262ca10d1666e
Version < f1ba83755d81c6fc66ac7acd723d238f974091e9
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.7
Status affected
Version 0
Version < 4.7
Status unaffected
Version <= 5.10.*
Version 5.10.253
Status unaffected
Version <= 5.15.*
Version 5.15.203
Status unaffected
Version <= 6.1.*
Version 6.1.167
Status unaffected
Version <= 6.6.*
Version 6.6.130
Status unaffected
Version <= 6.12.*
Version 6.12.78
Status unaffected
Version <= 6.18.*
Version 6.18.19
Status unaffected
Version <= 6.19.*
Version 6.19.9
Status unaffected
Version <= *
Version 7.0
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.094
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.