Impact
A flaw in the Linux kernel’s IPv6 route handling causes a mismatch in ECMP sibling counts when a static route that matches an existing gateway route is added, leading to a BUG_ON that triggers a kernel panic. The crash results in a loss of system availability, effectively a denial‑of‑service condition.
Affected Systems
All Linux kernel builds that include the vulnerability, specifically the release candidate series 6.19 rc1 through rc8 and any earlier kernels that have not incorporated the patch that restricts RTF_ADDRCONF clearing to routes without gateways.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1% suggests low likelihood of exploitation. The vulnerability requires privileged access to add or modify IPv6 routes, so it is primarily a local privilege escalation issue. The bug is not listed in the CISA KEV catalog, further indicating limited real‑world impact at present. Nevertheless, the potential for a kernel panic warrants prompt patching.
OpenCVE Enrichment
Debian DSA