CVE-2026-23276
Stack Overflow in Linux Kernel Tunnel Transmit Functions
Publication date: 2026-03-20
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's network tunnel transmit (xmit) functions, specifically iptunnel_xmit and ip6tunnel_xmit, which lacked their own recursion limit.
When a bond device in broadcast mode has GRE tap interfaces as slaves, and those GRE tunnels route traffic back through the bond, multicast or broadcast traffic can cause infinite recursion between bond_xmit_broadcast() and ip_tunnel_xmit()/ip6_tnl_xmit().
This infinite recursion leads to a kernel stack overflow, which can cause system instability or crashes.
The existing recursion limit (XMIT_RECURSION_LIMIT) was insufficient because tunnel recursion involves more stack usage per level, so a lower limit (IP_TUNNEL_RECURSION_LIMIT) was introduced to prevent overflow.
Additionally, recursion detection helpers were added directly in the tunnel transmit functions to cover all IPv4/IPv6 tunnel paths, including UDP encapsulated tunnels like VXLAN and Geneve.
How can this vulnerability impact me? :
This vulnerability can cause a kernel stack overflow due to infinite recursion in network tunnel transmit functions when certain network configurations are used.
The impact includes potential system crashes, instability, or denial of service as the kernel stack overflows and the system may become unresponsive or reboot.
Systems using bonded network devices with GRE tap interfaces in broadcast mode are particularly at risk if multicast or broadcast traffic triggers this recursion.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know