Impact
The vulnerability resides in the Linux kernel’s IPv6 tunnel implementation where an uninitialized value can be read during decapsulation of IPv6 packets due to improper VLAN handling. This flaw can corrupt kernel memory or cause an immediate crash, resulting in a denial of service for hosts that process such packets.
Affected Systems
Affected systems are Linux installations using kernel versions 6.8 and the 6.19 release candidate series RC1 through RC8. The flaw exists in the ip6_tunnel code path that processes incoming IPv6 tunnel traffic. Upgrading to a kernel that contains the commit applying skb_vlan_inet_prepare resolves the issue.
Risk and Exploitability
The CVSS score is 5.5, indicating moderate impact, while the EPSS score is under 1%, suggesting a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. An attacker would need to send specially crafted IPv6 packets that exploit the VLAN handling bug, which could originate remotely by any host capable of transmitting traffic to the target system.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN