In the Linux kernel, the following vulnerability has been resolved: net: usb: qmiwwan: initialize MAC header offset in qmimuxrxfixup Raw IP packets have no MAC header, leaving skb->macheader uninitialized. This can trigger kernel panics on ARM64 when xfrm or other subsystems access the offset due to strict alignment checks. Initialize the MAC header to prevent such crashes. This can trigger kernel panics on ARM when running IPsec over the qmimux0 interface. Example trace: Internal error: Oops: 000000009600004f [#1] SMP CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.34-gbe78e49cb433 #1 Hardware name: LS1028A RDB Board (DT) pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : xfrminput+0xde8/0x1318 lr : xfrminput+0x61c/0x1318 sp : ffff800080003b20 Call trace: xfrminput+0xde8/0x1318 xfrm6rcv+0x38/0x44 xfrm6esprcv+0x48/0xa8 ip6protocoldeliverrcu+0x94/0x4b0 ip6inputfinish+0x44/0x70 ip6input+0x44/0xc0 ipv6rcv+0x6c/0x114 _netifreceiveskbonecore+0x5c/0x8c _netifreceiveskb+0x18/0x60 processbacklog+0x78/0x17c _napipoll+0x38/0x180 netrxaction+0x168/0x2f0