Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2026-23276— net: add xmit recursion limit to tunnel xmit functions

AI Predicted 5.3 Difficulty: Moderate EPSS 0.03% · P9

Possible ATT&CK Techniques 1AI

T1496 · Resource Hijacking

Affected Version Matrix 12

VendorProductVersion RangeStatus
LinuxLinux745e20f1b626b1be4b100af5d4bf7b3439392f8f< 834c4f645726a25fd71ea50cdfb5c135f8f95d85affected
745e20f1b626b1be4b100af5d4bf7b3439392f8f< 8a57deeb256069f262957d8012418559ff66c385affected
745e20f1b626b1be4b100af5d4bf7b3439392f8f< b56b8d19bd05e2a8338385c770bc2b60590bc81eaffected
745e20f1b626b1be4b100af5d4bf7b3439392f8f< 6f1a9140ecda3baba3d945b9a6155af4268aafc4affected
3f266b04185de51d8e6446eb1fccec3b5e7ce575affected
2.6.35.9< 2.6.36affected
2.6.37affected
< 2.6.37unaffected
… +4 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-23276

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
net: add xmit recursion limit to tunnel xmit functions
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: net: add xmit recursion limit to tunnel xmit functions Tunnel xmit functions (iptunnel_xmit, ip6tunnel_xmit) lack their own recursion limit. When a bond device in broadcast mode has GRE tap interfaces as slaves, and those GRE tunnels route back through the bond, multicast/broadcast traffic triggers infinite recursion between bond_xmit_broadcast() and ip_tunnel_xmit()/ip6_tnl_xmit(), causing kernel stack overflow. The existing XMIT_RECURSION_LIMIT (8) in the no-qdisc path is not sufficient because tunnel recursion involves route lookups and full IP output, consuming much more stack per level. Use a lower limit of 4 (IP_TUNNEL_RECURSION_LIMIT) to prevent overflow. Add recursion detection using dev_xmit_recursion helpers directly in iptunnel_xmit() and ip6tunnel_xmit() to cover all IPv4/IPv6 tunnel paths including UDP encapsulated tunnels (VXLAN, Geneve, etc.). Move dev_xmit_recursion helpers from net/core/dev.h to public header include/linux/netdevice.h so they can be used by tunnel code. BUG: KASAN: stack-out-of-bounds in blake2s.constprop.0+0xe7/0x160 Write of size 32 at addr ffff88810033fed0 by task kworker/0:1/11 Workqueue: mld mld_ifc_work Call Trace: <TASK> __build_flow_key.constprop.0 (net/ipv4/route.c:515) ip_rt_update_pmtu (net/ipv4/route.c:1073) iptunnel_xmit (net/ipv4/ip_tunnel_core.c:84) ip_tunnel_xmit (net/ipv4/ip_tunnel.c:847) gre_tap_xmit (net/ipv4/ip_gre.c:779) dev_hard_start_xmit (net/core/dev.c:3887) sch_direct_xmit (net/sched/sch_generic.c:347) __dev_queue_xmit (net/core/dev.c:4802) bond_dev_queue_xmit (drivers/net/bonding/bond_main.c:312) bond_xmit_broadcast (drivers/net/bonding/bond_main.c:5279) bond_start_xmit (drivers/net/bonding/bond_main.c:5530) dev_hard_start_xmit (net/core/dev.c:3887) __dev_queue_xmit (net/core/dev.c:4841) ip_finish_output2 (net/ipv4/ip_output.c:237) ip_output (net/ipv4/ip_output.c:438) iptunnel_xmit (net/ipv4/ip_tunnel_core.c:86) gre_tap_xmit (net/ipv4/ip_gre.c:779) dev_hard_start_xmit (net/core/dev.c:3887) sch_direct_xmit (net/sched/sch_generic.c:347) __dev_queue_xmit (net/core/dev.c:4802) bond_dev_queue_xmit (drivers/net/bonding/bond_main.c:312) bond_xmit_broadcast (drivers/net/bonding/bond_main.c:5279) bond_start_xmit (drivers/net/bonding/bond_main.c:5530) dev_hard_start_xmit (net/core/dev.c:3887) __dev_queue_xmit (net/core/dev.c:4841) ip_finish_output2 (net/ipv4/ip_output.c:237) ip_output (net/ipv4/ip_output.c:438) iptunnel_xmit (net/ipv4/ip_tunnel_core.c:86) ip_tunnel_xmit (net/ipv4/ip_tunnel.c:847) gre_tap_xmit (net/ipv4/ip_gre.c:779) dev_hard_start_xmit (net/core/dev.c:3887) sch_direct_xmit (net/sched/sch_generic.c:347) __dev_queue_xmit (net/core/dev.c:4802) bond_dev_queue_xmit (drivers/net/bonding/bond_main.c:312) bond_xmit_broadcast (drivers/net/bonding/bond_main.c:5279) bond_start_xmit (drivers/net/bonding/bond_main.c:5530) dev_hard_start_xmit (net/core/dev.c:3887) __dev_queue_xmit (net/core/dev.c:4841) mld_sendpack mld_ifc_work process_one_work worker_thread </TASK>
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于隧道发送函数缺少发送递归限制,可能导致无限递归和内核堆栈溢出。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 745e20f1b626b1be4b100af5d4bf7b3439392f8f ~ 834c4f645726a25fd71ea50cdfb5c135f8f95d85 -
LinuxLinux 2.6.37 -

II. Public POCs for CVE-2026-23276

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-23276

登录查看更多情报信息。

Patches & Fixes for CVE-2026-23276 (4)

Same Patch Batch · Linux · 2026-03-20 · 8 CVEs total

CVE-2026-232787.8 HIGHnetfilter: nf_tables: always walk all pending catchall elements
CVE-2026-232757.8 HIGHio_uring: ensure ctx->rings is stable for task work flags manipulation
CVE-2026-232747.8 HIGHnetfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels
CVE-2026-232737.8 HIGHmacvlan: observe an RCU grace period in macvlan_common_newlink() error path
CVE-2026-232727.8 HIGHnetfilter: nf_tables: unconditionally bump set->nelems before insertion
CVE-2026-232717.8 HIGHperf: Fix __perf_event_overflow() vs perf_remove_from_context() race
CVE-2026-23277net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit

IV. Related Vulnerabilities

V. Comments for CVE-2026-23276

No comments yet


Leave a comment