CVE-2026-23383Incorrect Pointer Scaling in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 97.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 25

Description

In the Linux kernel, the following vulnerability has been resolved: bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing struct bpf_plt contains a u64 target field. Currently, the BPF JIT allocator requests an alignment of 4 bytes (sizeof(u32)) for the JIT buffer. Because the base address of the JIT buffer can be 4-byte aligned (e.g., ending in 0x4 or 0xc), the relative padding logic in build_plt() fails to ensure that target lands on an 8-byte boundary. This leads to

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

Linuxlinux/linux_kernel6.0.06.12.77+2
Debianlinux/linux_kernel< 6.19.8-1
CVEListV5linux/linuxb2ad54e1533e91449cb2a371e034942bd7882b5880ad264da02cc4aee718e799c2b79f0f834673dc+4
debiandebian/linux< linux 6.19.8-1 (forky)

🔴Vulnerability Details

4
OSV
bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing2026-03-25
CVEList
bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing2026-03-25
GHSA
GHSA-887m-4qrh-hjq5: In the Linux kernel, the following vulnerability has been resolved: bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing stru2026-03-25
OSV
CVE-2026-23383: In the Linux kernel, the following vulnerability has been resolved: bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing struct2026-03-25

📋Vendor Advisories

3
Red Hat
kernel: bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing2026-03-25
Microsoft
bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing2026-03-10
Debian
CVE-2026-23383: linux - In the Linux kernel, the following vulnerability has been resolved: bpf, arm64:...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23383 Impact, Exploitability, and Mitigation Steps | Wiz