Description
In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conntrack_sip: fix Content-Length u32 truncation in sip_help_tcp()

sip_help_tcp() parses the SIP Content-Length header with
simple_strtoul(), which returns unsigned long, but stores the result in
unsigned int clen. On 64-bit systems, values exceeding UINT_MAX are
silently truncated before computing the SIP message boundary.

For example, Content-Length 4294967328 (2^32 + 32) is truncated to 32,
causing the parser to miscalculate where the current message ends. The
loop then treats trailing data in the TCP segment as a second SIP
message and processes it through the SDP parser.

Fix this by changing clen to unsigned long to match the return type of
simple_strtoul(), and reject Content-Length values that exceed the
remaining TCP payload length.
Published: 2026-04-03
Score: 7.0 High
EPSS: < 1% Very Low
KEV: No
Impact: Potential for SIP message misprocessing leading to denial of service or unexpected behavior
Action: Apply patch
AI Analysis

Impact

The vulnerability lies in the SIP Content-Length header parsing logic within the Linux kernel’s netfilter connection tracking module. The parser converts the header value using an unsigned long return type but stores it in an unsigned int. On 64‑bit systems, values larger than the maximum 32‑bit unsigned int are silently truncated, which causes the module to miscalculate the true end of the SIP message. As a result, trailing data in the TCP segment is interpreted as a second SIP message and passed to the SDP parser. The impact is that an attacker can send crafted SIP traffic that may be mishandled, potentially leading to denial of service or unexpected behavior within applications that rely on SIP parsing.

Affected Systems

The flaw is present in the Linux kernel’s netfilter nf_conntrack_sip implementation. All Linux kernel builds that include this module and have not applied the upstream patch are susceptible. No specific kernel version range was listed, so the risk applies to all affected releases before the fix was merged.

Risk and Exploitability

This is an integer truncation weakness categorized as CWE‑681. The CVSS score of 7.0 indicates a high severity. An attacker can exploit this by sending large Content‑Length values over TCP to a target running the vulnerable kernel. The attack vector is network‑based and does not require privileged access. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting that while exploitability is feasible, it may be less frequently observed in the wild.

Generated by OpenCVE AI on April 4, 2026 at 03:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the kernel patch that changes clen to unsigned long and rejects oversized Content‑Length values.

Generated by OpenCVE AI on April 4, 2026 at 03:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 09:15:00 +0000


Sat, 04 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-681
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conntrack_sip: fix Content-Length u32 truncation in sip_help_tcp() sip_help_tcp() parses the SIP Content-Length header with simple_strtoul(), which returns unsigned long, but stores the result in unsigned int clen. On 64-bit systems, values exceeding UINT_MAX are silently truncated before computing the SIP message boundary. For example, Content-Length 4294967328 (2^32 + 32) is truncated to 32, causing the parser to miscalculate where the current message ends. The loop then treats trailing data in the TCP segment as a second SIP message and processes it through the SDP parser. Fix this by changing clen to unsigned long to match the return type of simple_strtoul(), and reject Content-Length values that exceed the remaining TCP payload length.
Title netfilter: nf_conntrack_sip: fix Content-Length u32 truncation in sip_help_tcp()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-18T08:59:06.832Z

Reserved: 2026-01-13T15:37:46.020Z

Link: CVE-2026-23457

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-03T16:16:32.473

Modified: 2026-04-18T09:16:28.333

Link: CVE-2026-23457

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23457 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T07:17:22Z

Weaknesses