๐Ÿ” CVE Alert

CVE-2026-43916

UNKNOWN 0.0

pam_authnft: Heap buffer overflow in NETLINK_SOCK_DIAG reply walker

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

pam_authnft is a PAM session module binding nftables firewall rules to authenticated sessions via cgroupv2 inodes. Prior to 0.2.0-alpha, a heap buffer over-read in peer_lookup_tcp (src/peer_lookup.c:134, prior to the fix) allowed a crafted NETLINK_SOCK_DIAG reply to slip past the message-size check, then dereference past the end of the allocation. This vulnerability is fixed in 0.2.0-alpha.

CWE CWE-125 CWE-191
Vendor identd-ng
Product pam_authnft
Published May 12, 2026
Last Updated May 13, 2026
Stay Ahead of the Next One

Get instant alerts for identd-ng pam_authnft

Be the first to know when new unknown vulnerabilities affecting identd-ng pam_authnft are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

identd-ng / pam_authnft
< 0.2.0-alpha

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/identd-ng/pam_authnft/security/advisories/GHSA-5jj5-hm34-78vh github.com: https://github.com/identd-ng/pam_authnft/pull/10