VYPR
Medium severity5.5NVD Advisory· Published May 6, 2026· Updated May 17, 2026

CVE-2026-43220

CVE-2026-43220

Description

In the Linux kernel, the following vulnerability has been resolved:

iommu/amd: serialize sequence allocation under concurrent TLB invalidations

With concurrent TLB invalidations, completion wait randomly gets timed out because cmd_sem_val was incremented outside the IOMMU spinlock, allowing CMD_COMPL_WAIT commands to be queued out of sequence and breaking the ordering assumption in wait_on_sem(). Move the cmd_sem_val increment under iommu->lock so completion sequence allocation is serialized with command queuing. And remove the unnecessary return.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's AMD IOMMU driver, a race condition in completion sequence allocation under concurrent TLB invalidations can cause command timeouts.

Vulnerability

CVE-2026-43220 is a race condition in the AMD IOMMU driver for the Linux kernel's IOMMU subsystem. The root cause is that the cmd_sem_val counter, used to allocate completion sequence numbers for CMD_COMPL_WAIT commands, was incremented outside the IOMMU spinlock (iommu->lock). Under concurrent TLB invalidations, this allowed multiple threads to obtain the same sequence number or to queue CMD_COMPL_WAIT commands out of order, breaking the ordering assumption in the wait_on_sem() function and causing completion wait operations to randomly time out [1][1][2][3][4].

Exploitation

An attacker would need to be able to trigger concurrent TLB invalidations on a system using the AMD IOMMU. This could exploit this race condition. The vulnerability is triggered by normal IOMMU operations under high concurrency, not requiring any special privileges beyond the ability to initiate DMA or device passthrough operations that cause TLB invalidations. The race window is small but can be reliably hit under heavy I/O load.

Impact

A successful exploitation leads to IOMMU command completion wait timeouts, which can cause system instability, I/O errors, or denial of service. The impact is limited to availability (CVSS v3 base score 5.5, Medium severity) as the vulnerability does not allow privilege escalation or information disclosure.

Mitigation

The fix moves the cmd_sem_val increment inside the iommu->lock spinlock, serializing sequence allocation with command queuing. The fix has been applied to remove an unnecessary return statement is also included. Patches have been applied to the Linux kernel stable branches [1][2][3][4]. Users should update to a kernel version containing the fix commit d51bf43193b1 or later.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

1