Impact
In the Linux kernel a recent change made dev_hard_header() modify the skb->head pointer, breaking the assumption that arp_create() would see an unchanged head. The likely impact is that handling of ARP packets could corrupt kernel memory and trigger a crash, leading to a denial of service. Based on the description it is inferred that attackers would need local kernel privileges to supply crafted ARP traffic to trigger the fault.
Affected Systems
Linux kernel releases 6.1.160, 6.6.120, 6.19 rc4, and other 6.x versions that have not yet adopted the fix are affected. Any distribution embedding the upstream kernel without the patch remains vulnerable.
Risk and Exploitability
The vulnerability carries a CVSS score of 5.5, indicating moderate severity, and an EPSS score below 1%, suggesting a low likelihood of exploitation. It is not listed in the CISA KEV catalog. The risk is primarily local; a user with the ability to send ARP traffic can force a kernel crash, interrupting services. No public exploit is known, but the potential for memory corruption means the issue should be remediated promptly.
OpenCVE Enrichment