CVE-2026-23451
Description
In the Linux kernel, the following vulnerability has been resolved:
bonding: prevent potential infinite loop in bond_header_parse()
bond_header_parse() can loop if a stack of two bonding devices is setup, because skb->dev always points to the hierarchy top.
Add new "const struct net_device *dev" parameter to (struct header_ops)->parse() method to make sure the recursion is bounded, and that the final leaf parse method is called.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A stack of two bonding devices in the Linux kernel can cause an infinite loop in bond_header_parse(), leading to a denial of service.
Vulnerability
In the Linux kernel, the bonding driver contains a vulnerability in bond_header_parse() that can result in an infinite loop when a stack of two bonding devices is configured. The issue arises because skb->dev always points to the hierarchy top, causing unbounded recursion.
Exploitation
An attacker with the ability to configure nested bonding devices can trigger this flaw. No authentication is required beyond network configuration privileges, which may be available in container or virtualized environments.
Impact
Successful exploitation leads to a denial of service, as the infinite loop consumes CPU resources, potentially hanging or crashing the system.
Mitigation
The fix modifies the header_ops->parse() method to include a device parameter that bounds recursion. Patches are available in stable kernel updates [1][2][3][4]. Users should apply the latest kernel updates.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.