CVE-2026-43916 PUBLISHED

pam_authnft: Heap buffer overflow in NETLINK_SOCK_DIAG reply walker

Assigner: GitHub_M
Reserved: 04.05.2026 Published: 12.05.2026 Updated: 12.05.2026

pam_authnft is a PAM session module binding nftables firewall rules to authenticated sessions via cgroupv2 inodes. Prior to 0.2.0-alpha, a heap buffer over-read in peer_lookup_tcp (src/peer_lookup.c:134, prior to the fix) allowed a crafted NETLINK_SOCK_DIAG reply to slip past the message-size check, then dereference past the end of the allocation. This vulnerability is fixed in 0.2.0-alpha.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor identd-ng
Product pam_authnft
Versions
  • Version < 0.2.0-alpha is affected

References

Problem Types

  • CWE-125: Out-of-bounds Read CWE
  • CWE-191: Integer Underflow (Wrap or Wraparound) CWE