Impact
The uninitialized stack variable rtp_addr in the Linux kernel’s netfilter nf_conntrack_sip module causes nf_nat_sip to format a stale stack value into an IP address and rewrite the session owner and connection lines of SIP messages with it. The result is that SIP sessions may be incorrectly configured with 0.0.0.0 or a garbage address, leading to connectivity failures, misrouting of media streams, or a denial of service to SIP clients.
Affected Systems
All Linux kernel distributions that include the netfilter nf_conntrack_sip code before the recent commit are affected. The vulnerability applies to the Linux kernel itself, regardless of specific vendor, and affects any systems that employ SIP NAT functionality via nf_conntrack_sip. Version details are not explicitly listed, so any kernel that has not applied the patch is potentially vulnerable.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity. The EPSS score of 0.00035 implies a very low probability of exploitation, though it is not zero. This vulnerability can be exploited by an attacker who can send crafted SIP packets to a node running the vulnerable kernel, causing the kernel to rewrite session addresses incorrectly. This makes a network‑oriented exploitation likely if the system processes SIP traffic, but active exploitation has not been reported. The vulnerability is not listed in the CISA KEV catalog.
OpenCVE Enrichment
Debian DLA
Debian DSA