netfilter: nf_conntrack_h323: fix OOB read in decode_int() CONS case

Summary

CVECVE-2026-23456
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-04-03 16:16:32 UTC
Updated2026-04-18 09:16:28 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_h323: fix OOB read in decode_int() CONS case In decode_int(), the CONS case calls get_bits(bs, 2) to read a length value, then calls get_uint(bs, len) without checking that len bytes remain in the buffer. The existing boundary check only validates the 2 bits for get_bits(), not the subsequent 1-4 bytes that get_uint() reads. This allows a malformed H.323/RAS packet to cause a 1-4 byte slab-out-of-bounds read. Add a boundary check for len bytes after get_bits() and before get_uint().

Risk And Classification

EPSS: 0.000320000 probability, percentile 0.090980000 (date 2026-04-18)

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected 5e35941d990123f155b02d5663e51a24f816b6f3 a2cd54b9348e485d338b3c132338a4410c99afaf git Not specified
CNA Linux Linux affected 5e35941d990123f155b02d5663e51a24f816b6f3 c95dc674ebf01ecfb40388b6facfc89b81fed3b7 git Not specified
CNA Linux Linux affected 5e35941d990123f155b02d5663e51a24f816b6f3 41b417ff73a24b2c68134992cc44c88db27f482d git Not specified
CNA Linux Linux affected 5e35941d990123f155b02d5663e51a24f816b6f3 52235bf88159a1ef16434ab49e47e99c8a09ab20 git Not specified
CNA Linux Linux affected 5e35941d990123f155b02d5663e51a24f816b6f3 774a434f8c9c8602a976b2536f65d0172a07f4d2 git Not specified
CNA Linux Linux affected 5e35941d990123f155b02d5663e51a24f816b6f3 6bce72daeccca9aa1746e92d6c3d4784e71f2ebb git Not specified
CNA Linux Linux affected 5e35941d990123f155b02d5663e51a24f816b6f3 fb6c3596823ec5dd09c2123340330d7448f51a59 git Not specified
CNA Linux Linux affected 5e35941d990123f155b02d5663e51a24f816b6f3 1e3a3593162c96e8a8de48b1e14f60c3b57fca8a git Not specified
CNA Linux Linux affected 2.6.17 Not specified
CNA Linux Linux unaffected 2.6.17 semver Not specified
CNA Linux Linux unaffected 5.10.253 5.10.* semver Not specified
CNA Linux Linux unaffected 5.15.203 5.15.* semver Not specified
CNA Linux Linux unaffected 6.1.167 6.1.* semver Not specified
CNA Linux Linux unaffected 6.6.130 6.6.* semver Not specified
CNA Linux Linux unaffected 6.12.78 6.12.* semver Not specified
CNA Linux Linux unaffected 6.18.20 6.18.* semver Not specified
CNA Linux Linux unaffected 6.19.10 6.19.* semver Not specified
CNA Linux Linux unaffected 7.0 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/c95dc674ebf01ecfb40388b6facfc89b81fed3b7 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/fb6c3596823ec5dd09c2123340330d7448f51a59 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/774a434f8c9c8602a976b2536f65d0172a07f4d2 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/52235bf88159a1ef16434ab49e47e99c8a09ab20 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/1e3a3593162c96e8a8de48b1e14f60c3b57fca8a 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/a2cd54b9348e485d338b3c132338a4410c99afaf 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/6bce72daeccca9aa1746e92d6c3d4784e71f2ebb 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/41b417ff73a24b2c68134992cc44c88db27f482d 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report