SB20260216129 - Buffer overflow in Linux kernel arm64 kernel
Published: February 16, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2026-23128)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the swsusp_arch_suspend() function in arch/arm64/kernel/hibernate.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/122b7cb80f7d468fcc2d18cf7eb320f09f310a96
- https://git.kernel.org/stable/c/361df59ad01303008b9e091a1a6ed9bc95b1455a
- https://git.kernel.org/stable/c/6e32070d29d1a35d8f4b3c03babf6c0e5efd1d08
- https://git.kernel.org/stable/c/8557bdd9af8dd04911fba56ff92b17842b0b5c7f
- https://git.kernel.org/stable/c/9773a886f26766a8db92d4b342b620a82c2de7dd
- https://git.kernel.org/stable/c/e2f8216ca2d8e61a23cb6ec355616339667e0ba6