CVE-2026-23316
ARM64 Alignment Fault in Linux IPv4 Multipath Hash Seed
Publication date: 2026-03-25
Last updated on: 2026-04-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.11 |
| linux | linux_kernel | From 6.19 (inc) to 6.19.7 (exc) |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.17 (exc) |
| linux | linux_kernel | From 6.11.1 (inc) to 6.12.77 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's handling of the IPv4 multipath hash seed on ARM64 architectures. The issue arises because a structure containing two 32-bit fields (totaling 8 bytes) is read atomically using a macro that expects natural alignment. On ARM64, atomic load instructions require the data to be properly aligned. When compiled with Clang and Link Time Optimization (LTO), the compiler generates a 64-bit load instruction on a 4-byte aligned address, causing a fatal kernel panic due to an alignment fault.
Additionally, the write operation on this structure is flawed because it is split into two separate 32-bit writes, breaking atomicity and exposing a tear-write vulnerability. The fix involves reading and writing each 32-bit field separately with proper atomic operations to avoid alignment faults and ensure concurrency safety.
How can this vulnerability impact me? :
This vulnerability can cause a fatal kernel panic on ARM64 systems when the Linux kernel is compiled with Clang and LTO enabled. A kernel panic leads to a system crash, resulting in downtime and potential data loss.
Moreover, the tear-write vulnerability caused by non-atomic writes could lead to inconsistent or corrupted kernel state, which might be exploited or cause unpredictable system behavior.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is related to the Linux kernel's handling of the multipath hash seed structure on ARM64 architectures, specifically when compiled with Clang and LTO enabled.
Immediate mitigation steps include:
- Update the Linux kernel to a version that includes the fix for this issue, which involves changing the READ_ONCE() and WRITE_ONCE() operations to operate on 32-bit members rather than the entire 8-byte structure.
- Ensure that your kernel is not compiled with Clang and LTO enabled without the fix, as this combination triggers the alignment fault.
- If updating the kernel immediately is not possible, avoid configurations or workloads that trigger the multipath hash seed reads or writes on ARM64 systems compiled with Clang LTO.