Impact
A race condition in the Linux kernel’s macvlan driver causes a use‑after‑free of a network device when macvlan_common_newlink() encounters an error. The flaw violates an RCU grace period, which the core networking stack does not honor, leading to a kernel panic and service disruption. The vulnerability is categorized as CWE‑364, a race condition that results in memory misuse and system instability.
Affected Systems
All Linux kernel builds that incorporate the macvlan networking module are affected. Any host that can create macvlan interfaces—such as virtual machine hypervisors, container runtimes, or network appliances—may be vulnerable. No specific version constraints are listed beyond the generic Linux kernel, implying that all current releases containing the trigger code could be impacted.
Risk and Exploitability
The CVSS score of 7.8 indicates moderate‑to‑high severity, but the EPSS score is below 1 % and the vulnerability is not listed in the CISA KEV catalog, suggesting limited exploitation in the wild. Based on the description, the likely attack vector is local or privilege escalation that allows creation or manipulation of macvlan interfaces, which is a low probability in most scenarios. Nevertheless, the impact of a kernel crash is catastrophic for the affected host, shutting down the system and potentially erasing data.
OpenCVE Enrichment