CVE-2026-23456
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/04/2026
Last modified:
03/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: nf_conntrack_h323: fix OOB read in decode_int() CONS case<br />
<br />
In decode_int(), the CONS case calls get_bits(bs, 2) to read a length<br />
value, then calls get_uint(bs, len) without checking that len bytes<br />
remain in the buffer. The existing boundary check only validates the<br />
2 bits for get_bits(), not the subsequent 1-4 bytes that get_uint()<br />
reads. This allows a malformed H.323/RAS packet to cause a 1-4 byte<br />
slab-out-of-bounds read.<br />
<br />
Add a boundary check for len bytes after get_bits() and before<br />
get_uint().
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1e3a3593162c96e8a8de48b1e14f60c3b57fca8a
- https://git.kernel.org/stable/c/41b417ff73a24b2c68134992cc44c88db27f482d
- https://git.kernel.org/stable/c/52235bf88159a1ef16434ab49e47e99c8a09ab20
- https://git.kernel.org/stable/c/6bce72daeccca9aa1746e92d6c3d4784e71f2ebb
- https://git.kernel.org/stable/c/774a434f8c9c8602a976b2536f65d0172a07f4d2
- https://git.kernel.org/stable/c/fb6c3596823ec5dd09c2123340330d7448f51a59



