CVE-2025-38216
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/07/2025
Last modified:
18/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
iommu/vt-d: Restore context entry setup order for aliased devices<br />
<br />
Commit 2031c469f816 ("iommu/vt-d: Add support for static identity domain")<br />
changed the context entry setup during domain attachment from a<br />
set-and-check policy to a clear-and-reset approach. This inadvertently<br />
introduced a regression affecting PCI aliased devices behind PCIe-to-PCI<br />
bridges.<br />
<br />
Specifically, keyboard and touchpad stopped working on several Apple<br />
Macbooks with below messages:<br />
<br />
kernel: platform pxa2xx-spi.3: Adding to iommu group 20<br />
kernel: input: Apple SPI Keyboard as<br />
/devices/pci0000:00/0000:00:1e.3/pxa2xx-spi.3/spi_master/spi2/spi-APP000D:00/input/input0<br />
kernel: DMAR: DRHD: handling fault status reg 3<br />
kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr<br />
0xffffa000 [fault reason 0x06] PTE Read access is not set<br />
kernel: DMAR: DRHD: handling fault status reg 3<br />
kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr<br />
0xffffa000 [fault reason 0x06] PTE Read access is not set<br />
kernel: applespi spi-APP000D:00: Error writing to device: 01 0e 00 00<br />
kernel: DMAR: DRHD: handling fault status reg 3<br />
kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr<br />
0xffffa000 [fault reason 0x06] PTE Read access is not set<br />
kernel: DMAR: DRHD: handling fault status reg 3<br />
kernel: applespi spi-APP000D:00: Error writing to device: 01 0e 00 00<br />
<br />
Fix this by restoring the previous context setup order.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.35 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



