CVE-2026-43130
IOMMU dev-IOTLB Flush Flaw in Linux Kernel
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's iommu/vt-d subsystem. It involves improper handling of PCIe device accessibility in scalable mode. Specifically, the system relies on a function pci_dev_is_disconnected() to skip ATS invalidation for safely-removed devices, but this does not cover cases where the PCIe link is down due to faults. As a result, if a virtual machine fails to connect to a PCIe device and resources are released (for example, via "virsh destroy"), the system can experience a hard lockup during the release process.
The issue arises because the system does not properly flush the device IOTLB (Input-Output Translation Lookaside Buffer) when the PCIe device is inaccessible due to faults, leading to a hard lock. The fix involves using a more reliable check pci_device_is_present() instead of pci_dev_is_disconnected() to decide when to skip ATS invalidation, improving system stability.
How can this vulnerability impact me? :
This vulnerability can cause a hard lockup of the system when a PCIe device becomes inaccessible due to faults, especially in virtualized environments where virtual machines connect to PCIe devices. For example, if a VM fails to connect and resources are released, the system may freeze during this process.
Such a hard lockup can lead to system downtime, loss of availability, and potential disruption of services relying on the affected hardware or virtual machines.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved in the Linux kernel by changing the logic to flush dev-IOTLB only when the PCIe device is accessible in scalable mode, using pci_device_is_present() instead of pci_dev_is_disconnected() to avoid hard-lockups caused by link-down faults.
To mitigate this vulnerability immediately, you should update your Linux kernel to a version that includes the fix described in commit 4fc82cd907ac or later.