CVE-2026-31427
Use of Uninitialized Variable in Linux netfilter nf_conntrack_sip
Publication date: 2026-04-13
Last updated on: 2026-04-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
| linux_kernel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's netfilter component, specifically in the nf_conntrack_sip module. The function process_sdp() uses a variable called rtp_addr that is sometimes left uninitialized if the SDP (Session Description Protocol) body lacks certain media lines or contains only inactive or unrecognized media types. Despite this, the function still passes this uninitialized rtp_addr to another function, which then uses the stale or garbage stack value as an IP address to rewrite session owner and connection lines in the SDP. This can cause incorrect IP addresses like 0.0.0.0 or random stack data to be inserted into SDP sessions.
How can this vulnerability impact me? :
The impact of this vulnerability is that the SDP session owner and connection lines may be rewritten with incorrect IP addresses. This can lead to network communication issues, such as failed or misrouted SIP (Session Initiation Protocol) sessions, because the IP addresses used for media streams may be invalid or incorrect. In some cases, the rewritten address could be 0.0.0.0 or a random value from the stack, potentially disrupting VoIP or other multimedia communications relying on SIP.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by pre-initializing the rtp_addr variable in the Linux kernel netfilter nf_conntrack_sip module. To mitigate this vulnerability immediately, you should update your Linux kernel to a version that includes this fix.
Specifically, apply the kernel update that addresses the issue in process_sdp() where uninitialized rtp_addr was used, preventing incorrect rewriting of SDP session addresses.