OESA-2026-1469

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2026-1469
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2026-1469.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2026-1469
Upstream
Published
2026-02-28T12:46:06Z
Modified
2026-02-28T18:09:13.993043Z
Summary
kernel security update
Details

The Linux Kernel, the operating system core itself.

Security Fix(es):

A memory address truncation vulnerability exists in the irqchip/gic-v3-its driver of the Linux kernel. On 32-bit ARM machines with CONFIGARMLPAE enabled, when using larger VMSPLIT configurations, lowmem allocations may be backed by physical memory addresses above the 32-bit address limit. The GICv3 driver allocates the 'itt' object using GFPKERNEL. Since all memory below the 4GB physical address limit is in ZONEDMA in this configuration, kmalloc() defaults to higher addresses in ZONE_NORMAL. However, the driver stores these physical addresses in 32-bit 'unsigned long' variables, causing the high addresses to be truncated, which leads to system crashes.(CVE-2026-23085)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:20.03-LTS-SP4 / kernel

Package

Name
kernel
Purl
pkg:rpm/openEuler/kernel&distro=openEuler-20.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.19.90-2602.3.0.0363.oe2003sp4

Ecosystem specific

{
    "aarch64": [
        "bpftool-4.19.90-2602.3.0.0363.oe2003sp4.aarch64.rpm",
        "bpftool-debuginfo-4.19.90-2602.3.0.0363.oe2003sp4.aarch64.rpm",
        "kernel-4.19.90-2602.3.0.0363.oe2003sp4.aarch64.rpm",
        "kernel-debuginfo-4.19.90-2602.3.0.0363.oe2003sp4.aarch64.rpm",
        "kernel-debugsource-4.19.90-2602.3.0.0363.oe2003sp4.aarch64.rpm",
        "kernel-devel-4.19.90-2602.3.0.0363.oe2003sp4.aarch64.rpm",
        "kernel-source-4.19.90-2602.3.0.0363.oe2003sp4.aarch64.rpm",
        "kernel-tools-4.19.90-2602.3.0.0363.oe2003sp4.aarch64.rpm",
        "kernel-tools-debuginfo-4.19.90-2602.3.0.0363.oe2003sp4.aarch64.rpm",
        "kernel-tools-devel-4.19.90-2602.3.0.0363.oe2003sp4.aarch64.rpm",
        "perf-4.19.90-2602.3.0.0363.oe2003sp4.aarch64.rpm",
        "perf-debuginfo-4.19.90-2602.3.0.0363.oe2003sp4.aarch64.rpm",
        "python2-perf-4.19.90-2602.3.0.0363.oe2003sp4.aarch64.rpm",
        "python2-perf-debuginfo-4.19.90-2602.3.0.0363.oe2003sp4.aarch64.rpm",
        "python3-perf-4.19.90-2602.3.0.0363.oe2003sp4.aarch64.rpm",
        "python3-perf-debuginfo-4.19.90-2602.3.0.0363.oe2003sp4.aarch64.rpm"
    ],
    "src": [
        "kernel-4.19.90-2602.3.0.0363.oe2003sp4.src.rpm"
    ],
    "x86_64": [
        "bpftool-4.19.90-2602.3.0.0363.oe2003sp4.x86_64.rpm",
        "bpftool-debuginfo-4.19.90-2602.3.0.0363.oe2003sp4.x86_64.rpm",
        "kernel-4.19.90-2602.3.0.0363.oe2003sp4.x86_64.rpm",
        "kernel-debuginfo-4.19.90-2602.3.0.0363.oe2003sp4.x86_64.rpm",
        "kernel-debugsource-4.19.90-2602.3.0.0363.oe2003sp4.x86_64.rpm",
        "kernel-devel-4.19.90-2602.3.0.0363.oe2003sp4.x86_64.rpm",
        "kernel-source-4.19.90-2602.3.0.0363.oe2003sp4.x86_64.rpm",
        "kernel-tools-4.19.90-2602.3.0.0363.oe2003sp4.x86_64.rpm",
        "kernel-tools-debuginfo-4.19.90-2602.3.0.0363.oe2003sp4.x86_64.rpm",
        "kernel-tools-devel-4.19.90-2602.3.0.0363.oe2003sp4.x86_64.rpm",
        "perf-4.19.90-2602.3.0.0363.oe2003sp4.x86_64.rpm",
        "perf-debuginfo-4.19.90-2602.3.0.0363.oe2003sp4.x86_64.rpm",
        "python2-perf-4.19.90-2602.3.0.0363.oe2003sp4.x86_64.rpm",
        "python2-perf-debuginfo-4.19.90-2602.3.0.0363.oe2003sp4.x86_64.rpm",
        "python3-perf-4.19.90-2602.3.0.0363.oe2003sp4.x86_64.rpm",
        "python3-perf-debuginfo-4.19.90-2602.3.0.0363.oe2003sp4.x86_64.rpm"
    ]
}

Database specific

source
"https://repo.openeuler.org/security/data/osv/OESA-2026-1469.json"