CVE-2026-23085 — Incorrect Conversion between Numeric Types in Linux
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 4
Latest updateApr 16
Description
In the Linux kernel, the following vulnerability has been resolved:
irqchip/gic-v3-its: Avoid truncating memory addresses
On 32-bit machines with CONFIG_ARM_LPAE, it is possible for lowmem
allocations to be backed by addresses physical memory above the 32-bit
address limit, as found while experimenting with larger VMSPLIT
configurations.
This caused the qemu virt model to crash in the GICv3 driver, which
allocates the 'itt' object using GFP_KERNEL. Since all memory below
the 4GB physical addr…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Affected Packages3 packages
▶CVEListV5linux/linuxcc2d3216f53c9fff0030eb71cacc4ce5f39d1d7e — e332b3b69e5b3acf07204a4b185071bab15c2b88+7
Patches
🔴Vulnerability Details
3OSV▶
CVE-2026-23085: In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3-its: Avoid truncating memory addresses On 32-bit machines with CONF↗2026-02-04
GHSA▶
GHSA-v2xc-c9fw-v73w: In the Linux kernel, the following vulnerability has been resolved:
irqchip/gic-v3-its: Avoid truncating memory addresses
On 32-bit machines with CO↗2026-02-04
📋Vendor Advisories
4Debian▶
CVE-2026-23085: linux - In the Linux kernel, the following vulnerability has been resolved: irqchip/gic...↗2026