CVE-2026-31427
mediumCVSS v3 Base Score
5.8
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
Attack Characteristics
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Confidentiality
Low
Integrity
Low
Availability
High
Published: April 13, 2026 (31 days ago)
Last Modified: April 13, 2026
Vendor: Red Hat
Source: REDHAT
Vulnerability Report
Generated by CyberWatcher
Description
A flaw was found in the Linux kernel's netfilter subsystem, specifically within the nf_conntrack_sip module. This vulnerability occurs in the process_sdp function when the rtp_addr variable is used without proper initialization if the Session Description Protocol (SDP) body lacks recognized media types or active media sections. A remote attacker could potentially exploit this by sending specially crafted SDP messages, leading to the rewriting of session-level owner and connection addresses with uninitialized or stale stack values. This could result in information disclosure or unexpected network behavior, potentially causing a denial of service.
CWE
CWE-824Affected Products
Red Hat Enterprise Linux 10Red Hat Enterprise Linux 6Red Hat Enterprise Linux 7Red Hat Enterprise Linux 8Red Hat Enterprise Linux 9