CVE-2026-31502
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/04/2026
Last modified:
22/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
team: fix header_ops type confusion with non-Ethernet ports<br />
<br />
Similar to commit 950803f72547 ("bonding: fix type confusion in<br />
bond_setup_by_slave()") team has the same class of header_ops type<br />
confusion.<br />
<br />
For non-Ethernet ports, team_setup_by_port() copies port_dev->header_ops<br />
directly. When the team device later calls dev_hard_header() or<br />
dev_parse_header(), these callbacks can run with the team net_device<br />
instead of the real lower device, so netdev_priv(dev) is interpreted as<br />
the wrong private type and can crash.<br />
<br />
The syzbot report shows a crash in bond_header_create(), but the root<br />
cause is in team: the topology is gre -> bond -> team, and team calls<br />
the inherited header_ops with its own net_device instead of the lower<br />
device, so bond_header_create() receives a team device and interprets<br />
netdev_priv() as bonding private data, causing a type confusion crash.<br />
<br />
Fix this by introducing team header_ops wrappers for create/parse,<br />
selecting a team port under RCU, and calling the lower device callbacks<br />
with port->dev, so each callback always sees the correct net_device<br />
context.<br />
<br />
Also pass the selected lower device to the lower parse callback, so<br />
recursion is bounded in stacked non-Ethernet topologies and parse<br />
callbacks always run with the correct device context.



