CVE-2026-43916
pam_authnft: Heap buffer overflow in NETLINK_SOCK_DIAG reply walker
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
pam_authnft is a PAM session module binding nftables firewall rules to authenticated sessions via cgroupv2 inodes. Prior to 0.2.0-alpha, a heap buffer over-read in peer_lookup_tcp (src/peer_lookup.c:134, prior to the fix) allowed a crafted NETLINK_SOCK_DIAG reply to slip past the message-size check, then dereference past the end of the allocation. This vulnerability is fixed in 0.2.0-alpha.
| CWE | CWE-125 CWE-191 |
| Vendor | identd-ng |
| Product | pam_authnft |
| Published | May 12, 2026 |
| Last Updated | May 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for identd-ng pam_authnft
Be the first to know when new unknown vulnerabilities affecting identd-ng pam_authnft are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
identd-ng / pam_authnft
< 0.2.0-alpha