CVE-2026-23001

In the Linux kernel, the following vulnerability has been resolved: macvlan: fix possible UAF in macvlan_forward_source() Add RCU protection on (struct macvlan_source_entry)->vlan. Whenever macvlan_hash_del_source() is called, we must clear entry->vlan pointer before RCU grace period starts. This allows macvlan_forward_source() to skip over entries queued for freeing. Note that macvlan_dev are already RCU protected, as they are embedded in a standard netdev (netdev_priv(ndev)). https: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE@google.com/T/#u
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.18:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*

History

25 Mar 2026, 19:23

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta: macvlan: soluciona posible UAF en macvlan_forward_source() Añade protección RCU en (struct macvlan_source_entry)->vlan. Siempre que se llama a macvlan_hash_del_source(), debemos borrar el puntero entry->vlan antes de que comience el período de gracia de RCU. Esto permite a macvlan_forward_source() omitir entradas en cola para ser liberadas. Tenga en cuenta que macvlan_dev ya están protegidos por RCU, ya que están incrustados en un netdev estándar (netdev_priv(ndev)). https: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE@google.com/T/#u
CPE cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.18:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/15f6faf36e162532bec5cc05eb3fc622108bf2ed - () https://git.kernel.org/stable/c/15f6faf36e162532bec5cc05eb3fc622108bf2ed - Patch
References () https://git.kernel.org/stable/c/232afc74a6dde0fe1830988e5827921f5ec9bb3f - () https://git.kernel.org/stable/c/232afc74a6dde0fe1830988e5827921f5ec9bb3f - Patch
References () https://git.kernel.org/stable/c/484919832e2db6ce1e8add92c469e5d459a516b5 - () https://git.kernel.org/stable/c/484919832e2db6ce1e8add92c469e5d459a516b5 - Patch
References () https://git.kernel.org/stable/c/6dbead9c7677186f22b7981dd085a0feec1f038e - () https://git.kernel.org/stable/c/6dbead9c7677186f22b7981dd085a0feec1f038e - Patch
References () https://git.kernel.org/stable/c/7470a7a63dc162f07c26dbf960e41ee1e248d80e - () https://git.kernel.org/stable/c/7470a7a63dc162f07c26dbf960e41ee1e248d80e - Patch
References () https://git.kernel.org/stable/c/8133e85b8a3ec9f10d861e0002ec6037256e987e - () https://git.kernel.org/stable/c/8133e85b8a3ec9f10d861e0002ec6037256e987e - Patch
References () https://git.kernel.org/stable/c/8518712a2ca952d6da2238c6f0a16b4ae5ea3f13 - () https://git.kernel.org/stable/c/8518712a2ca952d6da2238c6f0a16b4ae5ea3f13 - Patch
CWE CWE-416

06 Feb 2026, 17:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/232afc74a6dde0fe1830988e5827921f5ec9bb3f -
  • () https://git.kernel.org/stable/c/484919832e2db6ce1e8add92c469e5d459a516b5 -
  • () https://git.kernel.org/stable/c/8133e85b8a3ec9f10d861e0002ec6037256e987e -

30 Jan 2026, 10:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/15f6faf36e162532bec5cc05eb3fc622108bf2ed -

25 Jan 2026, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-25 15:15

Updated : 2026-03-25 19:23


NVD link : CVE-2026-23001

Mitre link : CVE-2026-23001

CVE.ORG link : CVE-2026-23001


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free