Impact
The vulnerability occurs in the Linux kernel’s macvlan subsystem. A use‑after‑free condition within macvlan_forward_source() allows an attacker to manipulate the VLAN pointer during a deletion sequence. If successful, the kernel may execute code in an uncontrolled context, potentially granting the attacker kernel‑level privileges. This flaw is linked to CWE‑416 and carries a CVSS score of 7.8. The description indicates that the issue was resolved by adding RCU protection and clearing the pointer before the grace period starts, preventing stale references.
Affected Systems
Affected products are Linux kernel releases that incorporate the macvlan code path, notably kernel 3.18 and the 6.19 release candidates from rc1 through rc8. The CPE list also references the generic Linux kernel family, implying any kernel version lacking the applied patch is susceptible. Systems running one of these kernels without the fix remain vulnerable.
Risk and Exploitability
The CVSS base score of 7.8 indicates high severity, but the EPSS score of less than 1% suggests a currently low likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog, indicating that no widespread or confirmed attacks have been reported yet. Attackers would need to trigger a packet processing path that deletes a macvlan source entry while an attacker controls the associated VLAN pointer, implying local or possibly remote code execution if the attacker can manipulate traffic directed to the kernel.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN