In the Linux kernel, the following vulnerability has been resolved:
irqchip/gic-v3-its: Avoid truncating memory addresses
On 32-bit machines with CONFIG_ARM_LPAE, it is possible for lowmem
allocations to be backed by addresses physical memory above the 32-bit
address limit, as found while experimenting with larger VMSPLIT
configurations.
This caused the qemu virt model to crash in the GICv3 driver, which
allocates the 'itt' object using GFP_KERNEL. Since all memory below
the 4GB physical address limit is in ZONE_DMA in this configuration,
kmalloc() defaults to higher addresses for ZONE_NORMAL, and the
ITS driver stores the physical address in a 32-bit 'unsigned long'
variable.
Change the itt_addr variable to the correct phys_addr_t type instead,
along with all other variables in this driver that hold a physical
address.
The gicv5 driver correctly uses u64 variables, while all other irqchip
drivers don't call virt_to_phys or similar interfaces. It's expected that
other device drivers have similar issues, but fixing this one is
sufficient for booting a virtio based guest.
References
Configurations
Configuration 1 (hide)
|
History
17 Mar 2026, 21:10
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Linux linux Kernel |
|
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* |
|
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/03faa61eb4b9ca9aa09bd91d4c3773d8e7b1ac98 - Patch | |
| References | () https://git.kernel.org/stable/c/084ba3b99f2dfd991ce7e84fb17117319ec3cd9f - Patch | |
| References | () https://git.kernel.org/stable/c/1b323391560354d8c515de8658b057a1daa82adb - Patch | |
| References | () https://git.kernel.org/stable/c/85215d633983233809f7d4dad163b953331b8238 - Patch | |
| References | () https://git.kernel.org/stable/c/8d76a7d89c12d08382b66e2f21f20d0627d14859 - Patch | |
| References | () https://git.kernel.org/stable/c/e2f9c751f73a2d5bb62d94ab030aec118a811f27 - Patch | |
| References | () https://git.kernel.org/stable/c/e332b3b69e5b3acf07204a4b185071bab15c2b88 - Patch |
06 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
04 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-04 17:16
Updated : 2026-03-17 21:10
NVD link : CVE-2026-23085
Mitre link : CVE-2026-23085
CVE.ORG link : CVE-2026-23085
JSON object : View
Products Affected
linux
- linux_kernel
CWE
