#VU124537 Improper Access Control in Linux kernel - CVE-2026-23310

 

#VU124537 Improper Access Control in Linux kernel - CVE-2026-23310

Published: March 25, 2026


Vulnerability identifier: #VU124537
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-23310
CWE-ID: CWE-284
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Linux kernel
Software vendor:
Linux Foundation

Description

The vulnerability allows a local user to cause a denial of service.

The vulnerability exists due to improper access control in the bonding driver when changing the xmit_hash_policy to vlan+srcmac while an XDP program is loaded on a bond interface in 802.3ad or balance-xor mode. A local user can change the xmit_hash_policy to cause an inconsistent state, leading to failure in uninstalling the XDP program and triggering a kernel warning during bond device destruction.

The attacker must have the ability to configure bonding interface settings, which requires local access and privileges to modify network device parameters.


Remediation

Install security update from vendor's repository.

External links