CVE-2026-23457 PUBLISHED

netfilter: nf_conntrack_sip: fix Content-Length u32 truncation in sip_help_tcp()

Assigner: Linux
Reserved: 13.01.2026 Published: 03.04.2026 Updated: 03.04.2026

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conntrack_sip: fix Content-Length u32 truncation in sip_help_tcp()

sip_help_tcp() parses the SIP Content-Length header with simple_strtoul(), which returns unsigned long, but stores the result in unsigned int clen. On 64-bit systems, values exceeding UINT_MAX are silently truncated before computing the SIP message boundary.

For example, Content-Length 4294967328 (2^32 + 32) is truncated to 32, causing the parser to miscalculate where the current message ends. The loop then treats trailing data in the TCP segment as a second SIP message and processes it through the SDP parser.

Fix this by changing clen to unsigned long to match the return type of simple_strtoul(), and reject Content-Length values that exceed the remaining TCP payload length.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from f5b321bd37fbec9188feb1f721ab46a5ac0b35da to b75209debb9adab287b3caa982f77788c1e15027 (excl.)
  • affected from f5b321bd37fbec9188feb1f721ab46a5ac0b35da to 528b4509c9dfc272e2e92d811915e5211650d383 (excl.)
  • affected from f5b321bd37fbec9188feb1f721ab46a5ac0b35da to 75fcaee5170e7dbbee778927134ef2e9568b4659 (excl.)
  • affected from f5b321bd37fbec9188feb1f721ab46a5ac0b35da to 865dba58958c3a86786f89a501971ab0e3ec6ba9 (excl.)
  • affected from f5b321bd37fbec9188feb1f721ab46a5ac0b35da to d4f17256544cc37f6534a14a27a9dec3540c2015 (excl.)
  • affected from f5b321bd37fbec9188feb1f721ab46a5ac0b35da to fbce58e719a17aa215c724473fd5baaa4a8dc57c (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 2.6.34 is affected
  • unaffected from 0 to 2.6.34 (excl.)
  • unaffected from 6.1.167 to 6.1.* (incl.)
  • unaffected from 6.6.130 to 6.6.* (incl.)
  • unaffected from 6.12.78 to 6.12.* (incl.)
  • unaffected from 6.18.20 to 6.18.* (incl.)
  • unaffected from 6.19.10 to 6.19.* (incl.)
  • unaffected from 7.0-rc5 to * (incl.)

References