PatchSiren cyber security CVE debrief
CVE-2026-31416 Linux CVE debrief
CVE-2026-31416 covers a Linux kernel netfilter bug in nfnetlink_log where NLMSG_DONE failed to account for the netlink header size. The CVE description says this can trigger a WARN splat and cause the netlink message to be dropped. NVD rates the issue as local, low-privilege, no-interaction, with high availability impact and no confidentiality or integrity impact.
- Vendor
- Linux
- Product
- Unknown
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-04-13
- Original CVE updated
- 2026-05-20
- Advisory published
- 2026-04-13
- Advisory updated
- 2026-05-20
Who should care
Linux kernel maintainers, distro security teams, and operators running affected kernels should care most, especially where netfilter/nfnetlink_log is used. Because the issue is local and availability-focused, it is most relevant on systems where local users or local workloads can exercise the affected path.
Technical summary
The bug is an accounting error in the netlink message length calculation for NLMSG_DONE: the code accounted for attribute size but not the netlink header size. Per the CVE description, the practical effect is limited to a WARN splat and dropped netlink message. NVD lists Linux kernel CPE ranges across multiple maintained branches, with affected coverage extending from older stable series through 6.19.12 and 7.0 rc releases. The record includes multiple kernel.org stable patch references.
Defensive priority
Medium. This is a local vulnerability with low privileges required and availability-only impact, so it is not an emergency for most environments, but affected kernels should still be patched promptly—especially on systems where local users or netfilter logging paths are present.
Recommended defensive actions
- Apply the relevant Linux kernel updates or stable backports referenced in the NVD record and kernel.org patch links.
- Prioritize patching systems that expose the affected kernel branches listed by NVD, including long-term stable releases and mainline RC builds.
- Validate whether nfnetlink_log or related netfilter logging functionality is used in your environment, and schedule remediation accordingly.
- Monitor affected hosts for kernel WARN events or dropped netlink messages as part of normal post-patch verification.
- Track vendor advisory and kernel stable stream updates for the specific branch you run.
Evidence notes
This debrief is based only on the supplied CVE description, NVD metadata, and official kernel.org references. The source text states that NLMSG_DONE must account for the netlink header size, not just the attribute size, and that the visible effect can be a WARN splat plus netlink message drop. NVD assigns CVSS 3.1 vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H and lists multiple affected Linux kernel version ranges and patch references. PublishedAt is 2026-04-13T14:16:10.907Z; modifiedAt is 2026-05-20T15:36:14.193Z.
Official resources
-
CVE-2026-31416 CVE record
CVE.org
-
CVE-2026-31416 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
Publicly disclosed in the CVE record on 2026-04-13 and updated by NVD on 2026-05-20.