Impact
The flaw occurs in the Linux kernel’s IPTFS packet reassembly logic when a non‑linear socket buffer is mistakenly appended to with skb_put, triggering the SKB_LINEAR_ASSERT check and causing a kernel panic. A malicious sender can craft fragmented IP packets that exercise this path, forcing the system to reboot or halt, which disrupts availability for that host.
Affected Systems
The vulnerability is present in any Linux kernel that implements the IPTFS feature, and no specific version range is specified in the advisory. All affected systems using the default IPTFS configuration are at risk until the patch is applied.
Risk and Exploitability
No CVSS or EPSS score is provided and the issue is not listed in the CISA KEV catalog, but the crash‑based nature of the flaw gives it high exploitability via network traffic. An attacker can target a host by sending a series of IP fragments that trigger the reassembly path. The only known mitigation is to apply the vendor’s fix or otherwise disable IPTFS processing.
OpenCVE Enrichment