CVE-2026-23085

Source
https://cve.org/CVERecord?id=CVE-2026-23085
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23085.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23085
Downstream
Related
Published
2026-02-04T16:08:09.368Z
Modified
2026-03-24T08:59:20.835801Z
Summary
irqchip/gic-v3-its: Avoid truncating memory addresses
Details

In the Linux kernel, the following vulnerability has been resolved:

irqchip/gic-v3-its: Avoid truncating memory addresses

On 32-bit machines with CONFIGARMLPAE, it is possible for lowmem allocations to be backed by addresses physical memory above the 32-bit address limit, as found while experimenting with larger VMSPLIT configurations.

This caused the qemu virt model to crash in the GICv3 driver, which allocates the 'itt' object using GFPKERNEL. Since all memory below the 4GB physical address limit is in ZONEDMA in this configuration, kmalloc() defaults to higher addresses for ZONE_NORMAL, and the ITS driver stores the physical address in a 32-bit 'unsigned long' variable.

Change the ittaddr variable to the correct physaddr_t type instead, along with all other variables in this driver that hold a physical address.

The gicv5 driver correctly uses u64 variables, while all other irqchip drivers don't call virttophys or similar interfaces. It's expected that other device drivers have similar issues, but fixing this one is sufficient for booting a virtio based guest.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23085.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cc2d3216f53c9fff0030eb71cacc4ce5f39d1d7e
Fixed
e332b3b69e5b3acf07204a4b185071bab15c2b88
Fixed
e2f9c751f73a2d5bb62d94ab030aec118a811f27
Fixed
85215d633983233809f7d4dad163b953331b8238
Fixed
1b323391560354d8c515de8658b057a1daa82adb
Fixed
084ba3b99f2dfd991ce7e84fb17117319ec3cd9f
Fixed
03faa61eb4b9ca9aa09bd91d4c3773d8e7b1ac98
Fixed
8d76a7d89c12d08382b66e2f21f20d0627d14859

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23085.json"