Issuing an ICMP ping via the `net ping` shell command to a device's own IPv4 address causes the network stack to recursively re-enter the input path on the same system work-queue stack. Because the destination is recognized as a local address, both the echo request and the resulting echo reply are processed inline before the current frame returns. The nested input-path frames exceed the work-queue stack and trigger a stack overflow.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 12 May 2026 06:30:00 +0000

Type Values Removed Values Added
Description Issuing an ICMP ping via the `net ping` shell command to a device's own IPv4 address causes the network stack to recursively re-enter the input path on the same system work-queue stack. Because the destination is recognized as a local address, both the echo request and the resulting echo reply are processed inline before the current frame returns. The nested input-path frames exceed the work-queue stack and trigger a stack overflow.
Title net: Stack Overflow with Ping (to own IP Address) via Shell
Weaknesses CWE-674
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: zephyr

Published:

Updated: 2026-05-12T05:39:02.537Z

Reserved: 2026-01-30T05:59:43.084Z

Link: CVE-2026-1681

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T07:16:09.843

Modified: 2026-05-12T07:16:09.843

Link: CVE-2026-1681

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T07:30:10Z

Weaknesses