CVE-2025-71202
IOMMU IOTLB Invalidation Flaw in Linux Kernel Enables Privilege Escalation
Publication date: 2026-02-14
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 4.4 (inc) to 6.18.7 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel relates to the handling of IOTLB (I/O Translation Lookaside Buffer) entries for the kernel address space. Specifically, stale IOTLB entries were not properly invalidated when kernel page table pages were freed and reused. This issue was addressed by introducing a new IOMMU interface that flushes the IOTLB paging cache entries for the CPU kernel address space before freeing these pages. The vulnerability could be triggered by unprivileged users through the common vfree() operation, potentially leading to stale memory mappings.
How can this vulnerability impact me? :
The impact of this vulnerability is related to the potential use of stale IOTLB entries in the kernel address space, which could lead to incorrect memory mappings. Since unprivileged users can trigger the main issue via vfree(), this could potentially be exploited to cause unexpected behavior or security issues in the kernel memory management. However, extremely rare cases related to memory unplug of reserved memory at boot are not exploitable by unprivileged users.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by introducing a new IOMMU interface that flushes IOTLB paging cache entries for the CPU kernel address space. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix.