CVE-2026-23456
Received Received - Intake
Out-of-Bounds Read in Linux netfilter nf_conntrack_h323 Component

Publication date: 2026-04-03

Last updated on: 2026-04-27

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_h323: fix OOB read in decode_int() CONS case In decode_int(), the CONS case calls get_bits(bs, 2) to read a length value, then calls get_uint(bs, len) without checking that len bytes remain in the buffer. The existing boundary check only validates the 2 bits for get_bits(), not the subsequent 1-4 bytes that get_uint() reads. This allows a malformed H.323/RAS packet to cause a 1-4 byte slab-out-of-bounds read. Add a boundary check for len bytes after get_bits() and before get_uint().
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-03
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-04-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's netfilter component, specifically in the nf_conntrack_h323 module. It involves an out-of-bounds (OOB) read in the decode_int() function within the CONS case. The function calls get_bits(bs, 2) to read a length value, then calls get_uint(bs, len) without verifying that the buffer contains enough bytes for the requested read. The boundary check only validates the 2 bits read by get_bits(), not the subsequent 1 to 4 bytes read by get_uint(). This flaw allows a malformed H.323/RAS packet to trigger a 1-4 byte slab out-of-bounds read.

The fix involves adding a boundary check for the length bytes after get_bits() and before get_uint() to prevent reading beyond the buffer.


How can this vulnerability impact me? :

This vulnerability can lead to an out-of-bounds read of 1 to 4 bytes in kernel memory when processing malformed H.323/RAS packets. Such out-of-bounds reads can potentially cause system instability, crashes, or may be leveraged by attackers to gain information about kernel memory, which could aid in further exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart