Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43220
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-06 May, 2026 | 11:28
Updated At-11 May, 2026 | 22:20
Rejected At-
▼CVE Numbering Authority (CNA)
iommu/amd: serialize sequence allocation under concurrent TLB invalidations

In the Linux kernel, the following vulnerability has been resolved: iommu/amd: serialize sequence allocation under concurrent TLB invalidations With concurrent TLB invalidations, completion wait randomly gets timed out because cmd_sem_val was incremented outside the IOMMU spinlock, allowing CMD_COMPL_WAIT commands to be queued out of sequence and breaking the ordering assumption in wait_on_sem(). Move the cmd_sem_val increment under iommu->lock so completion sequence allocation is serialized with command queuing. And remove the unnecessary return.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/iommu/amd/amd_iommu_types.h
  • drivers/iommu/amd/init.c
  • drivers/iommu/amd/iommu.c
Default Status
unaffected
Versions
Affected
  • From e15768e68820142077bbca402d8e902f64ade1b0 before 5000ce7fcb31067566a1a1a2e5b5bbff93625242 (git)
  • From 496269d12072ecb219826485bdbec70c92a8eef5 before 48caa7542a795c9679ec1bd1bc2592e05a7369a4 (git)
  • From d2a0cac10597068567d336e85fa3cbdbe8ca62bf before 9e249c48412828e807afddc21527eb734dc9bd3d (git)
  • f2f65b28d802a667119147444ec2ae33eebf9a58 (git)
  • 715c263119fd1b918a9fcbd8a36ea5b604a46324 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/iommu/amd/amd_iommu_types.h
  • drivers/iommu/amd/init.c
  • drivers/iommu/amd/iommu.c
Default Status
unaffected
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/5000ce7fcb31067566a1a1a2e5b5bbff93625242
N/A
https://git.kernel.org/stable/c/48caa7542a795c9679ec1bd1bc2592e05a7369a4
N/A
https://git.kernel.org/stable/c/9e249c48412828e807afddc21527eb734dc9bd3d
N/A
Hyperlink: https://git.kernel.org/stable/c/5000ce7fcb31067566a1a1a2e5b5bbff93625242
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/48caa7542a795c9679ec1bd1bc2592e05a7369a4
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/9e249c48412828e807afddc21527eb734dc9bd3d
Resource: N/A
Details not found