In the Linux kernel, the following vulnerability has been resolved: macvlan: fix possible UAF in macvlan_forward_source() Add RCU protection on (struct macvlan_source_entry)->vlan. Whenever macvlan_hash_del_source() is called, we must clear entry->vlan pointer before RCU grace period starts. This allows macvlan_forward_source() to skip over entries queued for freeing. Note that macvlan_dev are already RCU protected, as they are embedded in a standard netdev (netdev_priv(ndev)). https: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE@google.com/T/#u
| Vendor | Product | Versions |
|---|---|---|
| linux | linux_kernel | < 5.10.249, < 5.15.199, < 6.1.162, < 6.6.122, < 6.12.67, < 6.18.7 |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| amazon | amazon linux | cert_advisory | 90% |
| canonical | ubuntu linux | cert_advisory | 90% |
| debian | debian linux | cert_advisory | 90% |
| ibm | ibm qradar siem | cert_advisory | 90% |
| open source | open source linux kernel | cert_advisory | 90% |