SB2026040672 - Integer overflow in Linux kernel netfilter
Published: April 6, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Integer overflow (CVE-ID: CVE-2026-23457)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to integer truncation in nf_conntrack_sip when parsing the SIP Content-Length header in sip_help_tcp() over TCP. A remote attacker can send a specially crafted SIP message with an oversized Content-Length value to cause a denial of service.
On 64-bit systems, a Content-Length value exceeding UINT_MAX can be truncated before the SIP message boundary is computed, causing trailing TCP segment data to be treated as a second SIP message and processed through the SDP parser.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/528b4509c9dfc272e2e92d811915e5211650d383
- https://git.kernel.org/stable/c/75fcaee5170e7dbbee778927134ef2e9568b4659
- https://git.kernel.org/stable/c/865dba58958c3a86786f89a501971ab0e3ec6ba9
- https://git.kernel.org/stable/c/b75209debb9adab287b3caa982f77788c1e15027
- https://git.kernel.org/stable/c/d4f17256544cc37f6534a14a27a9dec3540c2015
- https://git.kernel.org/stable/c/fbce58e719a17aa215c724473fd5baaa4a8dc57c