Impact
The vulnerability involves a NULL pointer dereference in the Linux kernel's net/sched:teql scheduler path. When a GRE tunnel functions as a TEQL slave, the kernel incorrectly leaves skb->dev pointing to the master device, causing iptunnel_xmit to reference uninitialized per‑CPU statistics and trigger a page fault. The resulting kernel crash (KASAN Oops) brings the system to an unavailable state, effectively a denial of service.
Affected Systems
Affected systems are any Linux kernel installations that enable the TEQL scheduler and use GRE tap tunnels as TEQL slaves. This includes most Linux distributions that ship with a standard kernel prior to the patch commit that properly sets skb->dev. No specific version range is listed, so all kernels before the fix are potentially vulnerable in the default configuration.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1% suggests low exploitation probability. The vulnerability is not in KEV. Based on the description, it is inferred that an attacker can exploit this by sending crafted traffic through an exposed TEQL‑enabled GRE tap tunnel; no local privileges are required. Successful exploitation results in a local system crash, limiting the impact to the compromised host.
OpenCVE Enrichment