CVE-2026-23456

high

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_h323: fix OOB read in decode_int() CONS case In decode_int(), the CONS case calls get_bits(bs, 2) to read a length value, then calls get_uint(bs, len) without checking that len bytes remain in the buffer. The existing boundary check only validates the 2 bits for get_bits(), not the subsequent 1-4 bytes that get_uint() reads. This allows a malformed H.323/RAS packet to cause a 1-4 byte slab-out-of-bounds read. Add a boundary check for len bytes after get_bits() and before get_uint().

References

https://git.kernel.org/stable/c/fb6c3596823ec5dd09c2123340330d7448f51a59

https://git.kernel.org/stable/c/c95dc674ebf01ecfb40388b6facfc89b81fed3b7

https://git.kernel.org/stable/c/a2cd54b9348e485d338b3c132338a4410c99afaf

https://git.kernel.org/stable/c/774a434f8c9c8602a976b2536f65d0172a07f4d2

https://git.kernel.org/stable/c/6bce72daeccca9aa1746e92d6c3d4784e71f2ebb

https://git.kernel.org/stable/c/52235bf88159a1ef16434ab49e47e99c8a09ab20

https://git.kernel.org/stable/c/41b417ff73a24b2c68134992cc44c88db27f482d

https://git.kernel.org/stable/c/1e3a3593162c96e8a8de48b1e14f60c3b57fca8a

Details

Source: Mitre, NVD

Published: 2026-04-03

Updated: 2026-04-27

Risk Information

CVSS v2

Base Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:C

Severity: High

CVSS v3

Base Score: 8.2

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

Severity: High

EPSS

EPSS: 0.00024