CVE-2026-23099
Out-of-Bounds Read in Linux Bonding 8023AD Mode on Ethernet
Publication date: 2026-02-04
Last updated on: 2026-03-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 5.16 (inc) to 6.1.162 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.122 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.68 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.18.8 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 2.6.24 (inc) to 5.15.199 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's bonding driver, specifically related to the BOND_MODE_8023AD mode. The issue arises because BOND_MODE_8023AD is intended only for Ethernet devices (ARPHRD_ETHER), but the code did not properly limit its use to these devices. This led to a global out-of-bounds memory access in the function __hw_addr_create within the dev_addr_lists.c file, which was detected by the Kernel Address Sanitizer (KASAN). The out-of-bounds read could cause memory corruption or kernel crashes.
How can this vulnerability impact me? :
The vulnerability can lead to kernel memory corruption or crashes due to out-of-bounds memory access. This can cause system instability, denial of service, or potentially allow an attacker to execute arbitrary code within the kernel context if exploited. Systems using the bonding driver with BOND_MODE_8023AD on non-Ethernet devices are particularly at risk.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability relates to the Linux kernel bonding driver, specifically the BOND_MODE_8023AD mode being limited to Ethernet devices. Detection would involve checking if the system is using bonding with BOND_MODE_8023AD on non-Ethernet devices.
You can inspect the bonding configuration and current bonding modes using commands such as:
- cat /proc/net/bonding/bond0 # Replace bond0 with your bonding interface
- ip link show # To list network interfaces and their states
- ethtool bond0 # To get detailed information about the bonding interface
Look specifically for bonding mode settings and verify that BOND_MODE_8023AD is only applied to Ethernet devices (ARPHRD_ETHER).
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by limiting BOND_MODE_8023AD to Ethernet devices only. Immediate mitigation steps include:
- Verify and ensure that bonding mode 802.3ad (LACP) is only configured on Ethernet devices.
- Avoid configuring bonding with BOND_MODE_8023AD on non-Ethernet interfaces.
- Update the Linux kernel to a version that includes the fix for this vulnerability.
These steps will prevent the out-of-bounds memory access issue reported by syzbot.