Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2857 articles · 109864 vulns · 38/41 feeds (7d)
← Back to list
7.8
CVE-2026-23001PATCHED
linux · linux_kernel

In the Linux kernel, the following vulnerability has been resolved: macvlan: fix possible UAF in macvlan_forward_source() Add RCU protection on (struct macvlan_source_entry)->vlan. Whenever macvlan

Description

In the Linux kernel, the following vulnerability has been resolved: macvlan: fix possible UAF in macvlan_forward_source() Add RCU protection on (struct macvlan_source_entry)->vlan. Whenever macvlan_hash_del_source() is called, we must clear entry->vlan pointer before RCU grace period starts. This allows macvlan_forward_source() to skip over entries queued for freeing. Note that macvlan_dev are already RCU protected, as they are embedded in a standard netdev (netdev_priv(ndev)). https: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE@google.com/T/#u

Affected Products

VendorProductVersions
linuxlinux_kernel< 5.10.249, < 5.15.199, < 6.1.162, < 6.6.122, < 6.12.67, < 6.18.7

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
amazonamazon linuxcert_advisory90%
canonicalubuntu linuxcert_advisory90%
debiandebian linuxcert_advisory90%
ibmibm qradar siemcert_advisory90%
open sourceopen source linux kernelcert_advisory90%

References

  • https://git.kernel.org/stable/c/15f6faf36e162532bec5cc05eb3fc622108bf2ed(Patch)
  • https://git.kernel.org/stable/c/232afc74a6dde0fe1830988e5827921f5ec9bb3f(Patch)
  • https://git.kernel.org/stable/c/484919832e2db6ce1e8add92c469e5d459a516b5(Patch)
  • https://git.kernel.org/stable/c/6dbead9c7677186f22b7981dd085a0feec1f038e(Patch)
  • https://git.kernel.org/stable/c/7470a7a63dc162f07c26dbf960e41ee1e248d80e(Patch)
  • https://git.kernel.org/stable/c/8133e85b8a3ec9f10d861e0002ec6037256e987e(Patch)
  • https://git.kernel.org/stable/c/8518712a2ca952d6da2238c6f0a16b4ae5ea3f13(Patch)

Related News (6 articles)

Tier B
CERT-FR19h ago
Multiples vulnérabilités dans le noyau Linux d'Ubuntu (10 avril 2026)
→ No new info (linked only)
Tier B
CERT-FR19h ago
Multiples vulnérabilités dans le noyau Linux de Red Hat (10 avril 2026)
→ No new info (linked only)
Tier B
CERT-FR7d ago
Multiples vulnérabilités dans le noyau Linux de SUSE (03 avril 2026)
→ No new info (linked only)
Tier B
CERT-FR7d ago
Multiples vulnérabilités dans le noyau Linux de Red Hat (03 avril 2026)
→ No new info (linked only)
Tier B
BSI Advisories8d ago
[UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
→ No new info (linked only)
Tier B
CERT-FR14d ago
Multiples vulnérabilités dans le noyau Linux de SUSE (27 mars 2026)
→ No new info (linked only)
CVSS 3.17.8 HIGH
VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA KEV❌ No
Actively exploited❌ No
Patch available
5.10.2495.15.1996.1.1626.6.1226.12.676.18.7
CWECWE-416
PublishedJan 25, 2026
Last enriched8d ago
Trending Score38
Source articles6
Independent2
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-23406EXP
apparmor: fix side-effect bug in match_char() macro usage
Trending: 63
HIGHCVE-2026-23400EXP
In the Linux kernel, the following vulnerability has been resolved: rust_binder: call set_notification_done() without proc lock Consider the following sequence of events on a death listener: 1. The
Trending: 61
HIGHCVE-2026-31412EXP
usb: gadget: f_mass_storage: Fix potential integer overflow in check_command_size_in_blocks()
Trending: 61
HIGHCVE-2026-23398EXP
In the Linux kernel, the following vulnerability has been resolved: icmp: fix NULL pointer dereference in icmp_tag_validation() icmp_tag_validation() unconditionally dereferences the result of rcu_d
Trending: 58
HIGHCVE-2025-71075
In the Linux kernel, the following vulnerability has been resolved: scsi: aic94xx: fix use-after-free in device removal path The asd_pci_remove() function fails to synchronize with pending tasklets
Trending: 38

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
Jan 25, 2026
Patch Available
Mar 25, 2026
Discovered by ZDM
Apr 1, 2026