SB2026032560 - Unchecked Error Condition in Linux kernel arm64 net



SB2026032560 - Unchecked Error Condition in Linux kernel arm64 net

Published: March 25, 2026

Security Bulletin ID SB2026032560
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Unchecked Error Condition (CVE-ID: CVE-2026-23383)

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to improper memory alignment in the BPF JIT compiler when handling 64-bit atomic operations on arm64. A local user can trigger execution of a specially crafted BPF program to cause a torn read of a 64-bit jump target, leading to control flow hijacking and arbitrary code execution.

Exploitation requires the ability to load and execute BPF programs, which is typically available to unprivileged users in modern Linux distributions with CONFIG_BPF_JIT enabled.


Remediation

Install update from vendor's website.