CVE-2026-23316 — Incorrect Pointer Scaling in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 93.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 25
Description
In the Linux kernel, the following vulnerability has been resolved:
net: ipv4: fix ARM64 alignment fault in multipath hash seed
`struct sysctl_fib_multipath_hash_seed` contains two u32 fields
(user_seed and mp_seed), making it an 8-byte structure with a 4-byte
alignment requirement.
In `fib_multipath_hash_from_keys()`, the code evaluates the entire
struct atomically via `READ_ONCE()`:
mp_seed = READ_ONCE(net->ipv4.sysctl_fib_multipath_hash_seed).mp_seed;
While this silently works on GCC by …
Affected Packages4 packages
▶CVEListV5linux/linux4ee2a8cace3fb9a34aea6a56426f89d26dd514f3 — 4bdc94d45d5459f0149085dfc1efe733c8e14f11+4
🔴Vulnerability Details
3GHSA▶
GHSA-vcmv-6vcp-286q: In the Linux kernel, the following vulnerability has been resolved:
net: ipv4: fix ARM64 alignment fault in multipath hash seed
`struct sysctl_fib_m↗2026-03-25
OSV▶
CVE-2026-23316: In the Linux kernel, the following vulnerability has been resolved: net: ipv4: fix ARM64 alignment fault in multipath hash seed `struct sysctl_fib_mul↗2026-03-25