CVE-2026-43024
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2026
Last modified:
08/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: nf_tables: reject immediate NF_QUEUE verdict<br />
<br />
nft_queue is always used from userspace nftables to deliver the NF_QUEUE<br />
verdict. Immediately emitting an NF_QUEUE verdict is never used by the<br />
userspace nft tools, so reject immediate NF_QUEUE verdicts.<br />
<br />
The arp family does not provide queue support, but such an immediate<br />
verdict is still reachable. Globally reject NF_QUEUE immediate verdicts<br />
to address this issue.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.19.307 (including) | 4.20 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4.269 (including) | 5.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.210 (including) | 5.10.253 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.149 (including) | 5.15.203 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.76 (including) | 6.1.168 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.15 (including) | 6.6.134 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7.3 (including) | 6.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8.1 (including) | 6.12.81 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.22 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.8:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/17dc5d5a935c771338430cbc156a16a51cfd31e8
- https://git.kernel.org/stable/c/2f7f825a548be55420f0f5f716f6c27b9d312d3f
- https://git.kernel.org/stable/c/42a47f4b1b7695026ab9bc1bb35d4622b0835c95
- https://git.kernel.org/stable/c/4b12a3cc3f075e750cc3c5e693fd25fb400af4a2
- https://git.kernel.org/stable/c/68390437a998c3f2c57212b413abef5e6d657d88
- https://git.kernel.org/stable/c/da107398cbd4bbdb6bffecb2ce86d5c9384f4cec
- https://git.kernel.org/stable/c/f140593901724cfbd16597c3a4fcb24a58ae44b0
- https://git.kernel.org/stable/c/f710691be163ae6b39e4bcab9e5be32d329f035b



