Home

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_sip: fix Content-Length u32 truncation in sip_help_tcp() sip_help_tcp() parses the SIP Content-Length header with simple_strtoul(), which returns unsigned long, but stores the result in unsigned int clen. On 64-bit systems, values exceeding UINT_MAX are silently truncated before computing the SIP message boundary. For example, Content-Length 4294967328 (2^32 + 32) is truncated to 32, causing the parser to miscalculate where the current message ends. The loop then treats trailing data in the TCP segment as a second SIP message and processes it through the SDP parser. Fix this by changing clen to unsigned long to match the return type of simple_strtoul(), and reject Content-Length values that exceed the remaining TCP payload length.

PUBLISHED Reserved 2026-01-13 | Published 2026-04-03 | Updated 2026-05-11 | Assigner Linux




HIGH: 8.6CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

Product status

Default status
unaffected

f5b321bd37fbec9188feb1f721ab46a5ac0b35da (git) before ed81b6a7012485acdb9c6c80735a0b7d8e5e1873
affected

f5b321bd37fbec9188feb1f721ab46a5ac0b35da (git) before cd1b7403ec835f8a0b3f1f7e68ac26af2cb1e42f
affected

f5b321bd37fbec9188feb1f721ab46a5ac0b35da (git) before b75209debb9adab287b3caa982f77788c1e15027
affected

f5b321bd37fbec9188feb1f721ab46a5ac0b35da (git) before 528b4509c9dfc272e2e92d811915e5211650d383
affected

f5b321bd37fbec9188feb1f721ab46a5ac0b35da (git) before 75fcaee5170e7dbbee778927134ef2e9568b4659
affected

f5b321bd37fbec9188feb1f721ab46a5ac0b35da (git) before 865dba58958c3a86786f89a501971ab0e3ec6ba9
affected

f5b321bd37fbec9188feb1f721ab46a5ac0b35da (git) before d4f17256544cc37f6534a14a27a9dec3540c2015
affected

f5b321bd37fbec9188feb1f721ab46a5ac0b35da (git) before fbce58e719a17aa215c724473fd5baaa4a8dc57c
affected

Default status
affected

2.6.34
affected

Any version before 2.6.34
unaffected

5.10.253 (semver)
unaffected

5.15.203 (semver)
unaffected

6.1.167 (semver)
unaffected

6.6.130 (semver)
unaffected

6.12.78 (semver)
unaffected

6.18.20 (semver)
unaffected

6.19.10 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/ed81b6a7012485acdb9c6c80735a0b7d8e5e1873

git.kernel.org/...c/cd1b7403ec835f8a0b3f1f7e68ac26af2cb1e42f

git.kernel.org/...c/b75209debb9adab287b3caa982f77788c1e15027

git.kernel.org/...c/528b4509c9dfc272e2e92d811915e5211650d383

git.kernel.org/...c/75fcaee5170e7dbbee778927134ef2e9568b4659

git.kernel.org/...c/865dba58958c3a86786f89a501971ab0e3ec6ba9

git.kernel.org/...c/d4f17256544cc37f6534a14a27a9dec3540c2015

git.kernel.org/...c/fbce58e719a17aa215c724473fd5baaa4a8dc57c

cve.org (CVE-2026-23457)

nvd.nist.gov (CVE-2026-23457)

Download JSON