Impact
The vulnerability arises when the Linux bonding driver copies a non‑Ethernet slave’s header_ops directly into the bonded interface. Functions such as ipgre_header() then call netdev_priv() assuming the private data belongs to the slave’s driver, but the bond’s private data (struct bonding) is of a different type. This type confusion causes garbage reads and a kernel BUG that leads to a crash. The result is a kernel panic that can bring the entire system down, representing a denial of service.
Affected Systems
All Linux kernels that include the vulnerable bonding driver and lack the fix are impacted. The affected vendors are Linux distributions that ship the core kernel. The specific version range is any kernel older than the commit 6ac890f1d60ac3707ee8dae15a67d9a833e49956, as the patch replaces the buggy copy of header_ops.
Risk and Exploitability
The CVSS score of 7.0 indicates a medium to high severity for this kernel panic. EPSS is unavailable, so the likelihood of exploitation is unknown, but the flaw requires privileged access to configure bonding interfaces. Operating a bond with a non‑Ethernet slave such as a GRE tunnel can trigger the crash during normal traffic handling. The vulnerability is not listed in the CISA KEV catalog, suggesting no publicly known exploits yet, but its potential to cause a systemwide denial of service warrants prompt remediation.
OpenCVE Enrichment