VYPR
High severity7.5NVD Advisory· Published Apr 3, 2026· Updated Apr 27, 2026

CVE-2026-23451

CVE-2026-23451

Description

In the Linux kernel, the following vulnerability has been resolved:

bonding: prevent potential infinite loop in bond_header_parse()

bond_header_parse() can loop if a stack of two bonding devices is setup, because skb->dev always points to the hierarchy top.

Add new "const struct net_device *dev" parameter to (struct header_ops)->parse() method to make sure the recursion is bounded, and that the final leaf parse method is called.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stack of two bonding devices in the Linux kernel can cause an infinite loop in bond_header_parse(), leading to a denial of service.

Vulnerability

In the Linux kernel, the bonding driver contains a vulnerability in bond_header_parse() that can result in an infinite loop when a stack of two bonding devices is configured. The issue arises because skb->dev always points to the hierarchy top, causing unbounded recursion.

Exploitation

An attacker with the ability to configure nested bonding devices can trigger this flaw. No authentication is required beyond network configuration privileges, which may be available in container or virtualized environments.

Impact

Successful exploitation leads to a denial of service, as the infinite loop consumes CPU resources, potentially hanging or crashing the system.

Mitigation

The fix modifies the header_ops->parse() method to include a device parameter that bounds recursion. Patches are available in stable kernel updates [1][2][3][4]. Users should apply the latest kernel updates.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.