CVE-2026-23273Signal Handler Race Condition in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 97.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 20

Description

In the Linux kernel, the following vulnerability has been resolved: macvlan: observe an RCU grace period in macvlan_common_newlink() error path valis reported that a race condition still happens after my prior patch. macvlan_common_newlink() might have made @dev visible before detecting an error, and its caller will directly call free_netdev(dev). We must respect an RCU period, either in macvlan or the core networking stack. After adding a temporary mdelay(1000) in macvlan_forward_source_on

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

Linuxlinux/linux_kernel5.11.05.15.202+6
Debianlinux/linux_kernel< 6.18.14-1
CVEListV5linux/linuxda5c6b8ae47e414be47e5e04def15b25d5c962dc91e4ff8d966978901630fc29582c1a76d3c6e46c+8

🔴Vulnerability Details

4
OSV
macvlan: observe an RCU grace period in macvlan_common_newlink() error path2026-03-20
CVEList
macvlan: observe an RCU grace period in macvlan_common_newlink() error path2026-03-20
GHSA
GHSA-r5gh-q6f7-7q3v: In the Linux kernel, the following vulnerability has been resolved: macvlan: observe an RCU grace period in macvlan_common_newlink() error path vali2026-03-20
OSV
CVE-2026-23273: In the Linux kernel, the following vulnerability has been resolved: macvlan: observe an RCU grace period in macvlan_common_newlink() error path valis2026-03-20

📋Vendor Advisories

2
Red Hat
kernel: macvlan: observe an RCU grace period in macvlan_common_newlink() error path2026-03-20
Debian
CVE-2026-23273: linux - In the Linux kernel, the following vulnerability has been resolved: macvlan: ob...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23273 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23273 — Signal Handler Race Condition in Linux | cvebase