pam_authnft is a PAM session module binding nftables firewall rules to authenticated sessions via cgroupv2 inodes. Prior to 0.2.0-alpha, a heap buffer over-read in peer_lookup_tcp (src/peer_lookup.c:134, prior to the fix) allowed a crafted NETLINK_SOCK_DIAG reply to slip past the message-size check, then dereference past the end of the allocation. This vulnerability is fixed in 0.2.0-alpha.
Metrics
Affected Vendors & Products
References
History
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Identd-ng
Identd-ng pam Authnft |
|
| Vendors & Products |
Identd-ng
Identd-ng pam Authnft |
Tue, 12 May 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pam_authnft is a PAM session module binding nftables firewall rules to authenticated sessions via cgroupv2 inodes. Prior to 0.2.0-alpha, a heap buffer over-read in peer_lookup_tcp (src/peer_lookup.c:134, prior to the fix) allowed a crafted NETLINK_SOCK_DIAG reply to slip past the message-size check, then dereference past the end of the allocation. This vulnerability is fixed in 0.2.0-alpha. | |
| Title | pam_authnft: Heap buffer overflow in NETLINK_SOCK_DIAG reply walker | |
| Weaknesses | CWE-125 CWE-191 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-05-12T13:31:44.359Z
Updated: 2026-05-13T14:38:34.899Z
Reserved: 2026-05-04T16:11:33.086Z
Link: CVE-2026-43916
Updated: 2026-05-13T14:32:27.235Z
Status : Received
Published: 2026-05-12T14:17:08.080
Modified: 2026-05-12T14:17:08.080
Link: CVE-2026-43916
No data.