8.6

CVE-2026-23457

netfilter: nf_conntrack_sip: fix Content-Length u32 truncation in sip_help_tcp()

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conntrack_sip: fix Content-Length u32 truncation in sip_help_tcp()

sip_help_tcp() parses the SIP Content-Length header with
simple_strtoul(), which returns unsigned long, but stores the result in
unsigned int clen.  On 64-bit systems, values exceeding UINT_MAX are
silently truncated before computing the SIP message boundary.

For example, Content-Length 4294967328 (2^32 + 32) is truncated to 32,
causing the parser to miscalculate where the current message ends.  The
loop then treats trailing data in the TCP segment as a second SIP
message and processes it through the SDP parser.

Fix this by changing clen to unsigned long to match the return type of
simple_strtoul(), and reject Content-Length values that exceed the
remaining TCP payload length.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version f5b321bd37fbec9188feb1f721ab46a5ac0b35da
Version < ed81b6a7012485acdb9c6c80735a0b7d8e5e1873
Status affected
Version f5b321bd37fbec9188feb1f721ab46a5ac0b35da
Version < cd1b7403ec835f8a0b3f1f7e68ac26af2cb1e42f
Status affected
Version f5b321bd37fbec9188feb1f721ab46a5ac0b35da
Version < b75209debb9adab287b3caa982f77788c1e15027
Status affected
Version f5b321bd37fbec9188feb1f721ab46a5ac0b35da
Version < 528b4509c9dfc272e2e92d811915e5211650d383
Status affected
Version f5b321bd37fbec9188feb1f721ab46a5ac0b35da
Version < 75fcaee5170e7dbbee778927134ef2e9568b4659
Status affected
Version f5b321bd37fbec9188feb1f721ab46a5ac0b35da
Version < 865dba58958c3a86786f89a501971ab0e3ec6ba9
Status affected
Version f5b321bd37fbec9188feb1f721ab46a5ac0b35da
Version < d4f17256544cc37f6534a14a27a9dec3540c2015
Status affected
Version f5b321bd37fbec9188feb1f721ab46a5ac0b35da
Version < fbce58e719a17aa215c724473fd5baaa4a8dc57c
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.34
Status affected
Version 0
Version < 2.6.34
Status unaffected
Version <= 5.10.*
Version 5.10.253
Status unaffected
Version <= 5.15.*
Version 5.15.203
Status unaffected
Version <= 6.1.*
Version 6.1.167
Status unaffected
Version <= 6.6.*
Version 6.6.130
Status unaffected
Version <= 6.12.*
Version 6.12.78
Status unaffected
Version <= 6.18.*
Version 6.18.20
Status unaffected
Version <= 6.19.*
Version 6.19.10
Status unaffected
Version <= *
Version 7.0
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.07% 0.221
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
416baaa9-dc9f-4396-8d5f-8c081fb06d67 8.6 3.9 4.7
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
Es wurden noch keine Informationen zu CWE veröffentlicht.