Impact
A buffer overflow in the Linux kernel's ioam6 trace handling permits the schema contribution to be stored in a one‑byte field, causing a wraparound that bypasses the remaining‑space check and allows the full schema payload to be copied beyond the buffer end. Based on the description, it is inferred that this defect could lead to corruption of kernel memory and potentially arbitrary code execution on the host. The vulnerability directly affects kernel operations related to IPv6 trace data handling and is thus a kernel‑level flaw.
Affected Systems
The affected product is the Linux operating system kernel. No specific kernel version range is supplied in the data, implying that all kernels prior to the patch that introduced the overflow fix are susceptible. The vendor information lists "Linux:Linux" and the Common Platform Enumeration string references the generic Linux kernel. System administrators should treat any unpatched Linux kernel as vulnerable until further information delineates precise version bounds.
Risk and Exploitability
The CVSS score is 7.0, the EPSS metric is not available, and the vulnerability is not listed in the CISA KEV catalog, so there is a published severity score but no known exploit count. The flaw resides in a core kernel component that parses IPv6 trace data; therefore, based on the description, it is inferred that an attacker would need to be able to inject or influence such trace packets, implying a local or remote network‑based attack vector. While the lack of official exploitation evidence lowers the immediate risk, the kernel buffer overflow nature of the issue warrants prompt mitigation to prevent a potential privilege‑escalating or arbitrary‑code‑execution attack vector.
OpenCVE Enrichment