CVE-2026-43451 PUBLISHED

netfilter: nfnetlink_queue: fix entry leak in bridge verdict error path

Assigner: Linux
Reserved: 01.05.2026 Published: 08.05.2026 Updated: 08.05.2026

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink_queue: fix entry leak in bridge verdict error path

nfqnl_recv_verdict() calls find_dequeue_entry() to remove the queue entry from the queue data structures, taking ownership of the entry. For PF_BRIDGE packets, it then calls nfqa_parse_bridge() to parse VLAN attributes. If nfqa_parse_bridge() returns an error (e.g. NFQA_VLAN present but NFQA_VLAN_TCI missing), the function returns immediately without freeing the dequeued entry or its sk_buff.

This leaks the nf_queue_entry, its associated sk_buff, and all held references (net_device refcounts, struct net refcount). Repeated triggering exhausts kernel memory.

Fix this by dropping the entry via nfqnl_reinject() with NF_DROP verdict on the error path, consistent with other error handling in this file.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 8d45ff22f1b43249f0cf1baafe0262ca10d1666e to a907bea273b60d3e604ec4e8e1f6c49954805794 (excl.)
  • affected from 8d45ff22f1b43249f0cf1baafe0262ca10d1666e to 0b18d1b834ab5a5009be70b530f978d7989e445b (excl.)
  • affected from 8d45ff22f1b43249f0cf1baafe0262ca10d1666e to b38d2b4603fd3dda24eb8b3dd81c18a0930be97b (excl.)
  • affected from 8d45ff22f1b43249f0cf1baafe0262ca10d1666e to 47b1c5d1b0944aa88299f55a846fabaefc756982 (excl.)
  • affected from 8d45ff22f1b43249f0cf1baafe0262ca10d1666e to cf4a4df38d1747e06fc54f9879bd7a6f4178032f (excl.)
  • affected from 8d45ff22f1b43249f0cf1baafe0262ca10d1666e to 9853d94b82d303fc4ac37d592a23a154096ecd41 (excl.)
  • affected from 8d45ff22f1b43249f0cf1baafe0262ca10d1666e to 208669df703a25a601f45822b10c413f258bf275 (excl.)
  • affected from 8d45ff22f1b43249f0cf1baafe0262ca10d1666e to f1ba83755d81c6fc66ac7acd723d238f974091e9 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 4.7 is affected
  • unaffected from 0 to 4.7 (excl.)
  • unaffected from 5.10.253 to 5.10.* (incl.)
  • unaffected from 5.15.203 to 5.15.* (incl.)
  • unaffected from 6.1.167 to 6.1.* (incl.)
  • unaffected from 6.6.130 to 6.6.* (incl.)
  • unaffected from 6.12.78 to 6.12.* (incl.)
  • unaffected from 6.18.19 to 6.18.* (incl.)
  • unaffected from 6.19.9 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References