TopVuln

High-risk vulnerability digests

CVE-2026-31427

  • UNKNOWN

OESA-2026-2172 kernel security update

Details

CVSS v3
9.1
NVD published
2026-04-13 14:16:12
EPSS
<0.1% probability · 9.3th percentile — 2026-05-12
Affected versions
Unpatched Linux kernel versions with nf_conntrack_sip enabled
Summary
This vulnerability occurs in the Linux kernel's netfilter nf_conntrack_sip SIP connection tracking module. When processing SDP bodies with no valid media entries, the function uses an uninitialized stack variable for the RTP address. On distributions without automatic stack initialization, this can lead to sensitive memory leaks or unexpected network behavior.
Remediation
Apply the latest official Linux kernel security update that fixes this vulnerability. Test the patch on non-production systems before rolling out to production. Disable the nf_conntrack_sip module if it is not in use as a temporary workaround.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.