CVE-2026-43220
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/05/2026
Last modified:
17/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
iommu/amd: serialize sequence allocation under concurrent TLB invalidations<br />
<br />
With concurrent TLB invalidations, completion wait randomly gets timed out<br />
because cmd_sem_val was incremented outside the IOMMU spinlock, allowing<br />
CMD_COMPL_WAIT commands to be queued out of sequence and breaking the<br />
ordering assumption in wait_on_sem().<br />
Move the cmd_sem_val increment under iommu->lock so completion sequence<br />
allocation is serialized with command queuing.<br />
And remove the unnecessary return.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.128 (including) | 6.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12.75 (including) | 6.13 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/48caa7542a795c9679ec1bd1bc2592e05a7369a4
- https://git.kernel.org/stable/c/5000ce7fcb31067566a1a1a2e5b5bbff93625242
- https://git.kernel.org/stable/c/9e249c48412828e807afddc21527eb734dc9bd3d
- https://git.kernel.org/stable/c/d51bf43193b1e95dc4e34e540dc76e19def2ae5a
- https://git.kernel.org/stable/c/fca7aa0264ae99e5ff287d0ced5af0b82b121c4f



