CVE-2026-31427

medium Red Hat
CVSS v3 Base Score
5.8
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
Attack Characteristics
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Confidentiality
Low
Integrity
Low
Availability
High
Published: April 13, 2026 (31 days ago)
Last Modified: April 13, 2026
Vendor: Red Hat
Source: REDHAT

Description

A flaw was found in the Linux kernel's netfilter subsystem, specifically within the nf_conntrack_sip module. This vulnerability occurs in the process_sdp function when the rtp_addr variable is used without proper initialization if the Session Description Protocol (SDP) body lacks recognized media types or active media sections. A remote attacker could potentially exploit this by sending specially crafted SDP messages, leading to the rewriting of session-level owner and connection addresses with uninitialized or stale stack values. This could result in information disclosure or unexpected network behavior, potentially causing a denial of service.

CWE

CWE-824

Affected Products

Red Hat Enterprise Linux 10Red Hat Enterprise Linux 6Red Hat Enterprise Linux 7Red Hat Enterprise Linux 8Red Hat Enterprise Linux 9

References