Impact
A missing check for family values in the Linux kernel’s pfkey_send_migrate() routine allows truncated arguments to over‑fill a socket buffer. The resulting buffer overflow triggers a BUG in skb_put(), causing a kernel panic. This crash leads to a complete system shutdown, but does not provide a path to escape privilege limits.
Affected Systems
All Linux kernel releases before the commit that adds early family validation to af_key are affected. The kernel change is part of upstream development and applies to mainstream distributions that ship the original kernel code.
Risk and Exploitability
The CVSS score of 5.5 indicates medium severity while the EPSS score of less than 1% points to a low probability of exploitation. Local users who can send crafted PF_KEY requests—such as administrators manipulating IPsec configurations—can trigger the crash. The attack does not have a wide spread exploitation presence and is not listed in CISA KEV, but the denial of service impact mandates prompt patching.
OpenCVE Enrichment
Debian DLA
Debian DSA