CVE-2026-23346 — Type Confusion in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 94.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 25
Description
In the Linux kernel, the following vulnerability has been resolved:
arm64: io: Extract user memory type in ioremap_prot()
The only caller of ioremap_prot() outside of the generic ioremap()
implementation is generic_access_phys(), which passes a 'pgprot_t' value
determined from the user mapping of the target 'pfn' being accessed by
the kernel. On arm64, the 'pgprot_t' contains all of the non-address
bits from the pte, including the permission controls, and so we end up
returning a new user mapp…
Affected Packages3 packages
▶CVEListV5linux/linux893dea9ccd08dab924839354aba21d4ed7a9abc0 — 3d64dcc0799c2d6921ba027716b7be721eb19fa8+3
🔴Vulnerability Details
4GHSA▶
GHSA-xqp7-9gqv-6978: In the Linux kernel, the following vulnerability has been resolved:
arm64: io: Extract user memory type in ioremap_prot()
The only caller of ioremap↗2026-03-25
OSV▶
CVE-2026-23346: In the Linux kernel, the following vulnerability has been resolved: arm64: io: Extract user memory type in ioremap_prot() The only caller of ioremap_p↗2026-03-25