Impact
In the Linux kernel, the GSO segmentation routine incorrectly handles forwarded GRO packets that contain a frag_list following IPv4/IPv6 translation by XLAT. The bug causes protocol inconsistencies and a measurable drop in throughput because some fragments remain untranslated. This flaw leads to disrupted or corrupted traffic but does not establish a formal denial‑of‑service vector.
Affected Systems
The affected kernels are all release candidates in the 6.19 series, from RC1 through RC7, as identified by the CPE strings. Any system running one of these kernels without the patch is vulnerable.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity. The EPSS score is below 1% and the vulnerability is not listed in the CISA KEV catalog. An attacker could potentially trigger the faulty segmentation path by sending crafted packets over the network, which may result in degraded throughput or packet corruption, but no proven exploitation is documented.
OpenCVE Enrichment