CVE-2026-23455 — Integer Underflow (Wrap or Wraparound) in Linux
Severity
7.0HIGH
No vectorEPSS
0.0%
top 90.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 3
Description
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_conntrack_h323: check for zero length in DecodeQ931()
In DecodeQ931(), the UserUserIE code path reads a 16-bit length from
the packet, then decrements it by 1 to skip the protocol discriminator
byte before passing it to DecodeH323_UserInformation(). If the encoded
length is 0, the decrement wraps to -1, which is then passed as a
large value to the decoder, leading to an out-of-bounds read.
Add a check to ensure …
Affected Packages3 packages
▶CVEListV5linux/linux5e35941d990123f155b02d5663e51a24f816b6f3 — 495e97af9e7249ee02b72bb1d0848a6efc3700f4+6
🔴Vulnerability Details
2OSV▶
CVE-2026-23455: In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_h323: check for zero length in DecodeQ931() In DecodeQ931(↗2026-04-03
GHSA▶
GHSA-gm78-p64f-gx97: In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_conntrack_h323: check for zero length in DecodeQ931()
In DecodeQ93↗2026-04-03
📋Vendor Advisories
2🕵️Threat Intelligence
1💬Community
1Bugzilla▶
CVE-2026-23455 kernel: netfilter: nf_conntrack_h323: check for zero length in DecodeQ931()↗2026-04-03