CVE-2025-71089
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-04-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.13 (inc) to 6.18.4 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.120 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.64 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.163 (exc) |
| linux | linux_kernel | From 5.2 (inc) to 5.15.200 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can lead to privilege escalation or data corruption on affected Linux systems. An attacker could exploit stale IOMMU page table entries to gain unauthorized access to physical memory or escalate their privileges, potentially compromising system security and stability.
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's IOMMU Shared Virtual Addressing (SVA) feature on x86 architectures. The IOMMU hardware caches kernel page table entries, but the kernel lacks a mechanism to notify the IOMMU when these page tables are freed and reused. As a result, the IOMMU may hold stale entries, leading to use-after-free or write-after-free conditions. This can allow an attacker to cause privilege escalation or data corruption by making the IOMMU walk into attacker-controlled memory, potentially enabling arbitrary physical memory DMA access. The fix disables SVA on x86 until a safe notification mechanism is implemented to invalidate IOMMU caches before page reuse.
What immediate steps should I take to mitigate this vulnerability?
Disable Shared Virtual Addressing (SVA) on x86 architecture until the IOMMU can receive notification to flush the paging cache before freeing the CPU kernel page table pages. This prevents the IOMMU from caching stale kernel page table entries that could lead to use-after-free or write-after-free conditions and potential privilege escalation.