In the Linux kernel, the following vulnerability has been resolved: macvlan: fix possible UAF in macvlan_forward_source() Add RCU protection on (struct macvlan_source_entry)->vlan. Whenever macvlan_hash_del_source() is called, we must clear entry->vlan pointer before RCU grace period starts. This allows macvlan_forward_source() to skip over entries queued for freeing. Note that macvlan_dev are already RCU protected, as they are embedded in a standard netdev (netdev_priv(ndev)). https: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE/T/#u
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2026012534-CVE-2026-23001-7ab0@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:3964 https://access.redhat.com/errata/RHSA-2026:3964
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:3966 https://access.redhat.com/errata/RHSA-2026:3966
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:3963 https://access.redhat.com/errata/RHSA-2026:3963
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:4012 https://access.redhat.com/errata/RHSA-2026:4012