CVE-2026-23209

Severity
7.8HIGH
EPSS
0.0%
top 96.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14
Latest updateApr 9

Description

In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in macvlan_common_newlink() valis provided a nice repro to crash the kernel: ip link add p1 type veth peer p2 ip link set address 00:00:00:00:00:20 dev p1 ip link set up dev p1 ip link set up dev p2 ip link add mv0 link p2 type macvlan mode source ip link add invalid% link p2 type macvlan mode source macaddr add 00:00:00:00:00:20 ping -c1 -I p1 1.2.3.4 He also gave a very detailed analysis: Th

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel4.9.15.10.250+7
CVEListV5linux/linuxaa5fd0fb77486b8a6764ead8627baa14790e4280da5c6b8ae47e414be47e5e04def15b25d5c962dc+7
Debianlinux< 5.10.251-1+3
Debianlinux-6.1< 6.1.164-1~deb11u1

Patches

🔴Vulnerability Details

3
OSV
CVE-2026-23209: In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in macvlan_common_newlink() valis provided a nice repr2026-02-14
GHSA
GHSA-89j4-f3cq-gm32: In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in macvlan_common_newlink() valis provided a nice re2026-02-14
CVEList
macvlan: fix error recovery in macvlan_common_newlink()2026-02-14

📋Vendor Advisories

3
Ubuntu
Linux kernel (NVIDIA Tegra) vulnerabilities2026-04-09
Red Hat
kernel: macvlan: fix error recovery in macvlan_common_newlink()2026-02-14
Debian
CVE-2026-23209: linux - In the Linux kernel, the following vulnerability has been resolved: macvlan: fi...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23209 Impact, Exploitability, and Mitigation Steps | Wiz

💬Community

1
Bugzilla
CVE-2026-23209 kernel: macvlan: fix error recovery in macvlan_common_newlink()2026-02-14
CVE-2026-23209 (HIGH CVSS 7.8) | In the Linux kernel | cvebase.io