CVE-2025-40058
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's handling of dirty page tracking in the IOMMU (Input-Output Memory Management Unit) when using Intel VT-d technology. Dirty page tracking depends on the IOMMU atomically updating the dirty bit in paging-structure entries, which requires coherent memory between the IOMMU and the CPU. If the IOMMU page walk is incoherent, dirty page tracking fails. According to the Intel VT-d specification, attempting to atomically update bits in a paging-structure entry that is not snooped (i.e., incoherent) causes a non-recoverable fault. The fix prevents the IOMMU from being incorrectly configured for dirty page tracking in incoherent mode by marking SSADS as supported only when certain conditions (ecap_slads and ecap_smpwc support) are met.
How can this vulnerability impact me? :
If this vulnerability is exploited or triggered, it can cause non-recoverable faults in the system's memory management related to IOMMU operations. This could lead to system instability, crashes, or failures in memory tracking mechanisms, potentially affecting system reliability and performance.