Bug 2441860 (CVE-2026-2967)

Summary: CVE-2026-2967 Mongoose: Mongoose: Remote Denial of Service in TCP Sequence Number Handler
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in Cesanta Mongoose. A remote attacker could exploit an improper verification of the source of a communication channel within the TCP Sequence Number Handler. This vulnerability, specifically in the `getpeer` function, could lead to a Denial of Service (DoS) condition, making the affected system unavailable. While the attack complexity is high and exploitation is difficult, a public exploit has been disclosed.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2441880, 2441881, 2441882, 2441883, 2441884, 2441885, 2441886    
Bug Blocks:    

Description OSIDB Bzimport 2026-02-23 04:01:15 UTC
A security vulnerability has been detected in Cesanta Mongoose up to 7.20. This affects the function getpeer of the file /src/net_builtin.c of the component TCP Sequence Number Handler. The manipulation leads to improper verification of source of a communication channel. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitability is reported as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.