Impact
The vulnerability is a kernel out-of-bounds read triggered when configuring a bonded interface in mode 802.3ad. The check that limits this mode to Ethernet devices was removed, causing memory accesses beyond the bounds of the multicast address list. An attacker could force the kernel to read sensitive data or cause a kernel panic, resulting in information disclosure or denial of service.
Affected Systems
Linux kernel versions that contain the buggy binding logic, including the 6.19 release candidates (rc1 through rc6) and any subsequent kernels that did not apply the patch. The issue affects all distributions that ship these kernels without the fix.
Risk and Exploitability
With a CVSS score of 7.1 and an EPSS probability of less than 1%, the risk is moderate but the low exploit likelihood reflects the need for privileged router configuration or a local attacker who can manipulate bond interfaces via the netlink API. The vulnerability is not listed in the CISA KEV catalog, indicating no known public exploitation yet.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN