CVE-2026-23067
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
04/02/2026
Última modificación:
04/02/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
iommu/io-pgtable-arm: fix size_t signedness bug in unmap path<br />
<br />
__arm_lpae_unmap() returns size_t but was returning -ENOENT (negative<br />
error code) when encountering an unmapped PTE. Since size_t is unsigned,<br />
-ENOENT (typically -2) becomes a huge positive value (0xFFFFFFFFFFFFFFFE<br />
on 64-bit systems).<br />
<br />
This corrupted value propagates through the call chain:<br />
__arm_lpae_unmap() returns -ENOENT as size_t<br />
-> arm_lpae_unmap_pages() returns it<br />
-> __iommu_unmap() adds it to iova address<br />
-> iommu_pgsize() triggers BUG_ON due to corrupted iova<br />
<br />
This can cause IOVA address overflow in __iommu_unmap() loop and<br />
trigger BUG_ON in iommu_pgsize() from invalid address alignment.<br />
<br />
Fix by returning 0 instead of -ENOENT. The WARN_ON already signals<br />
the error condition, and returning 0 (meaning "nothing unmapped")<br />
is the correct semantic for size_t return type. This matches the<br />
behavior of other io-pgtable implementations (io-pgtable-arm-v7s,<br />
io-pgtable-dart) which return 0 on error conditions.



