CVE-2026-23067
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/02/2026
Last modified:
13/03/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
iommu/io-pgtable-arm: fix size_t signedness bug in unmap path<br />
<br />
__arm_lpae_unmap() returns size_t but was returning -ENOENT (negative<br />
error code) when encountering an unmapped PTE. Since size_t is unsigned,<br />
-ENOENT (typically -2) becomes a huge positive value (0xFFFFFFFFFFFFFFFE<br />
on 64-bit systems).<br />
<br />
This corrupted value propagates through the call chain:<br />
__arm_lpae_unmap() returns -ENOENT as size_t<br />
-> arm_lpae_unmap_pages() returns it<br />
-> __iommu_unmap() adds it to iova address<br />
-> iommu_pgsize() triggers BUG_ON due to corrupted iova<br />
<br />
This can cause IOVA address overflow in __iommu_unmap() loop and<br />
trigger BUG_ON in iommu_pgsize() from invalid address alignment.<br />
<br />
Fix by returning 0 instead of -ENOENT. The WARN_ON already signals<br />
the error condition, and returning 0 (meaning "nothing unmapped")<br />
is the correct semantic for size_t return type. This matches the<br />
behavior of other io-pgtable implementations (io-pgtable-arm-v7s,<br />
io-pgtable-dart) which return 0 on error conditions.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16 (including) | 6.18.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



