-

CVE-2026-23001

In the Linux kernel, the following vulnerability has been resolved:

macvlan: fix possible UAF in macvlan_forward_source()

Add RCU protection on (struct macvlan_source_entry)->vlan.

Whenever macvlan_hash_del_source() is called, we must clear
entry->vlan pointer before RCU grace period starts.

This allows macvlan_forward_source() to skip over
entries queued for freeing.

Note that macvlan_dev are already RCU protected, as they
are embedded in a standard netdev (netdev_priv(ndev)).

https: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE@google.com/T/#u
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 15f6faf36e162532bec5cc05eb3fc622108bf2ed
Version 79cf79abce71eb7dbc40e2f3121048ca5405cb47
Status affected
Version < 8518712a2ca952d6da2238c6f0a16b4ae5ea3f13
Version 79cf79abce71eb7dbc40e2f3121048ca5405cb47
Status affected
Version < 6dbead9c7677186f22b7981dd085a0feec1f038e
Version 79cf79abce71eb7dbc40e2f3121048ca5405cb47
Status affected
Version < 7470a7a63dc162f07c26dbf960e41ee1e248d80e
Version 79cf79abce71eb7dbc40e2f3121048ca5405cb47
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.18
Status affected
Version < 3.18
Version 0
Status unaffected
Version <= 6.6.*
Version 6.6.122
Status unaffected
Version <= 6.12.*
Version 6.12.67
Status unaffected
Version <= 6.18.*
Version 6.18.7
Status unaffected
Version <= *
Version 6.19-rc6
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.055
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.