Impact
A NULL pointer dereference in the Linux kernel’s icmp_tag_validation function can be triggered by receiving an ICMP Fragmentation Needed packet that references an unregistered inner IP protocol while the system is in hardened PMTU mode. The dereference occurs in softirq context, causing a kernel panic that crashes the entire system. This flaw is a classic pointer misuse identified by CWE‑476.
Affected Systems
All Linux kernel installations that have not incorporated the commit adding a NULL check before accessing inet_protos are affected. The issue is independent of distribution and applies broadly to any unpatched kernel version that uses the original icmp_tag_validation logic.
Risk and Exploitability
The vulnerability carries a strong denial‑of‑service impact due to the system crash. Exploitation requires an attacker to send a specifically crafted ICMP packet, and the condition appears only when hardened PMTU mode is enabled (ip_no_pmtu_disc set to 3). Because the attack surface is narrow and no widespread exploitation has been reported, the risk is moderate for environments using hardened PMTU and low for typical deployments.
OpenCVE Enrichment