Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1821 articles · 103989 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-23451EXPLOITEDPATCHED
linux · linux kernel

bonding: prevent potential infinite loop in bond_header_parse()

Description

A vulnerability classified as critical has been found in Linux Kernel up to 6.18.19/6.19.9/7.0-rc3/7.0-rc4. Impacted is the function bond_header_parse. The manipulation leads to infinite loop. This vulnerability is documented as CVE-2026-23451. The attack requires being on the local network. It is recommended to upgrade the affected component.

Affected Products

VendorProductVersions
linuxlinux kernel9baf26a91565b7bb2b1d9f99aaf884a2b28c2f6d, 6ac890f1d60ac3707ee8dae15a67d9a833e49956, 95597d11dc8bddb2b9a051c9232000bfbb5e43ba, 950803f7254721c1c15858fbbfae3deaaeeecb11, 7.0-rc4, 6.18.19, 6.19.9, 7.0-rc3

References

  • https://git.kernel.org/stable/c/946bb6cacf0ccada7bc80f1cfa07c1ed79511c1c
  • https://git.kernel.org/stable/c/4172a7901cf43fe1cc63ef7a2ef33735ff7b7d13
  • https://git.kernel.org/stable/c/9b49c854f14f5e2d493e562a1e28d2e57fe37371
  • https://git.kernel.org/stable/c/b7405dcf7385445e10821777143f18c3ce20fa04

Related News (2 articles)

Tier C
VulDB8h ago
CVE-2026-23451 | Linux Kernel up to 6.18.19/6.19.9/7.0-rc3/7.0-rc4 bond_header_parse infinite loop
→ No new info (linked only)
Tier C
Linux Kernel CVEs9h ago
CVE-2026-23451: bonding: prevent potential infinite loop in bond_header_parse()
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
946bb6cacf0ccada7bc80f1cfa07c1ed79511c1c4172a7901cf43fe1cc63ef7a2ef33735ff7b7d139b49c854f14f5e2d493e562a1e28d2e57fe37371b7405dcf7385445e10821777143f18c3ce20fa0406.18.206.19.107.0-rc5
PublishedApr 3, 2026
Last enriched8h agov2
Trending Score59
Source articles2
Independent2
Info Completeness7/14
Missing: cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-31393EXP
Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access
Trending: 59
CRITICALCVE-2026-31397EXP
mm/huge_memory: fix use of NULL folio in move_pages_huge_pmd()
Trending: 59
CRITICALCVE-2026-23463EXP
soc: fsl: qbman: fix race condition in qman_destroy_fq
Trending: 59
CRITICALCVE-2026-23438EXP
net: mvpp2: guard flow control update with global_tx_fc in buffer switching
Trending: 59
CRITICALCVE-2026-23449EXP
net/sched: teql: Fix double-free in teql_master_xmit
Trending: 59

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 3, 2026
Discovered by ZDM
Apr 3, 2026
Actively Exploited
Apr 3, 2026
Patch Available
Apr 3, 2026
Updated: description, severity, affectedVersions, activelyExploited
Apr 3, 2026

Version History

v2
Last enriched 8h ago
v2Tier C8h ago

Updated severity to CRITICAL, added affected versions 6.18.19, 6.19.9, 7.0-rc3, and noted that no exploit is available.

descriptionseverityaffectedVersionsactivelyExploited
via VulDB
v19h ago

Initial creation