CVE-2026-23310
Improper Input Validation in Linux Bonding Causes XDP Failure
Publication date: 2026-03-25
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's bonding driver related to the handling of the xmit_hash_policy when an XDP (eXpress Data Path) program is loaded. Specifically, the bonding driver allows changing the xmit_hash_policy to vlan+srcmac even when an XDP program is already attached, which is incompatible with certain bonding modes like 802.3ad and balance-xor.
Normally, the bonding driver prevents incompatible changes to the mode or xmit_hash_policy when an XDP program is loaded, but the function bond_option_xmit_hash_policy_set() lacked this guard. This allows a user to attach an XDP program with a compatible policy, then change the policy to vlan+srcmac, which is incompatible.
This leads to a state where the bonding device has an XDP program set but the policy check fails, causing errors and warnings when the bond is destroyed or the XDP program is removed.
How can this vulnerability impact me? :
This vulnerability can cause instability or unexpected errors in network bonding devices when using XDP programs. Specifically, it can lead to warnings and failures when removing XDP programs or destroying bonded interfaces, potentially disrupting network traffic or causing kernel warnings.
While it does not directly indicate a security breach or data compromise, the improper handling of bonding configurations with XDP programs could lead to network reliability issues or denial of service in environments relying on these features.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the xmit_hash_policy is not changed to vlan+srcmac when an XDP program is loaded on a bond in 802.3ad or balance-xor mode.
Specifically, avoid changing the xmit_hash_policy to vlan+srcmac on bonded interfaces running in 802.3ad or balance-xor mode while an XDP program is attached.
If possible, update the Linux kernel to a version that includes the fix which rejects such incompatible xmit_hash_policy changes when XDP is loaded.