| Summary | In the Linux kernel, the following vulnerability has been resolved: ipv6: icmp: clear skb2->cb[] in ip6_err_gen_icmpv6_unreach() Sashiko AI-review observed: In ip6_err_gen_icmpv6_unreach(), the skb is an outer IPv4 ICMP error packet IP6CB interprets the IPv4 inet_skb_parm as an inet6_skb_parm. The cipso If an attacker sends a forged ICMPv4 error with a CIPSO IP option, dsthao This would scan the inner, attacker-controlled IPv6 packet starting at that Could mip6_addr_swap() then perform a 16-byte swap that extends past the end Should the cb array also be cleared in ip6_err_gen_icmpv6_unreach() and This patch implements the first suggestion. I am not sure if ip6ip6_err() needs to be changed. |
|---|---|
| Publication Date | May 2, 2026, 12:16 a.m. |
| Registration Date | May 2, 2026, 4:07 a.m. |
| Last Update | May 2, 2026, 12:24 a.m. |