Impact
The Linux kernel lacks a recursion limit in certain tunnel transmission functions, leading to infinite recursion when a bond device receives multicast or broadcast traffic routed through GRE tap interfaces. This recursiveness causes a kernel stack overflow, triggering a crash that can deny network services. The weakness is identified as a loop condition without guard limits, fundamentally exposing the system to a defensive failure that can stop all traffic over the affected interface.
Affected Systems
All Linux kernel installations are impacted, regardless of vendor. The flaw exists in the core networking stack, affecting any configuration that uses bond devices in broadcast mode together with GRE tap slaves. No specific kernel version range is listed, implying that all builds prior to the fix are vulnerable.
Risk and Exploitability
The CVSS score of 5.5 reflects a moderate impact, while the EPSS score of less than 1% indicates a low probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog, suggesting it is not currently a high‑profile exploit. The likely attack vector is network‑based, where an external host can send crafted multicast or broadcast traffic to a bond interface configured with GRE tunnels, thereby triggering the stack overflow and causing a system crash.
OpenCVE Enrichment