Impact
The Linux kernel has a flaw that appears when IPv6 support is disabled. In that configuration the socket creation routine for IPv6 reports success but does not actually return a socket, leaving the caller with a null pointer. When a function later attempts to use that pointer, the kernel dereferences it, causing a null pointer fault and a kernel panic. This crash results in a denial of service, requiring a reboot to recover.
Affected Systems
All Linux kernels compiled with the configuration option CONFIG_IPV6 set to "n" are affected. The list of vendors includes the standard Linux kernel build, and no specific version ranges are noted, which means any kernel built in that manner remains vulnerable until the patch is applied.
Risk and Exploitability
The vulnerability can only be exercised through privileged netlink and socket interfaces, implying that a local user with elevated rights can trigger the crash. No public exploit has been announced; the EPSS score is unavailable and the issue is not listed in the CISA KEV catalog. Although exploitation requires local privilege, the single crash can take a whole system down, so the risk is significant for the affected installations.
OpenCVE Enrichment