CVE-2026-43161
Denial of Service in Linux Kernel IOMMU
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
| linux_kernel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's handling of PCIe endpoints with ATS (Address Translation Services) enabled and passed through to userspace applications like QEMU or DPDK. When the PCIe device's link drops unexpectedly, such as through surprise removal or a link fault, the system can hard-lock (freeze) because the Intel IOMMU waits indefinitely for an ATS invalidation request that never completes.
The issue arises because the kernel does not properly skip the ATS invalidation request when the device is disconnected unless Intel IOMMU scalable mode is enabled. Without scalable mode, the system hangs during device removal or link faults. The vulnerability involves improper handling of device disconnection and ATS invalidation, leading to system hard-locks.
How can this vulnerability impact me? :
This vulnerability can cause the host system to hard-lock or freeze when a PCIe device with ATS enabled loses its link unexpectedly or is removed. This means that critical systems running virtual machines or applications relying on PCIe passthrough (like QEMU or DPDK) may become unresponsive, leading to potential downtime and disruption of services.
In practical terms, if you are using PCIe devices with ATS enabled in a virtualized environment or for high-performance packet processing, an unexpected device disconnection or link fault could cause the entire host system to hang, requiring a reboot and causing loss of availability.