CVE-2026-39863

NameCVE-2026-39863
DescriptionKamailio is an open source implementation of a SIP Signaling Server. Prior to 6.1.1, 6.0.6, and 5.8.8, an out-of-bounds access in the core of Kamailio (formerly OpenSER and SER) allows remote attackers to cause a denial of service (process crash) via a specially crafted data packet sent over TCP. The issue impacts Kamailio instances having TCP or TLS listeners. This vulnerability is fixed in 5.1.1, 6.0.6, and 5.8.8.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
kamailio (PTS)bullseye5.4.4-1vulnerable
bookworm5.6.3-2vulnerable
trixie6.0.1-1+deb13u1vulnerable
forky6.0.5-1vulnerable
sid6.1.1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kamailiosource(unstable)6.1.1-2

Notes

https://github.com/kamailio/kamailio/security/advisories/GHSA-2wj4-f825-2h2f

Search for package or bug name: Reporting problems