Bug 2467088 (CVE-2026-43220) - CVE-2026-43220 kernel: iommu/amd: serialize sequence allocation under concurrent TLB invalidations
Summary: CVE-2026-43220 kernel: iommu/amd: serialize sequence allocation under concurr...
Keywords:
Status: NEW
Alias: CVE-2026-43220
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
unspecified
unspecified
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-05-06 13:03 UTC by OSIDB Bzimport
Modified: 2026-05-06 22:04 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-05-06 13:03:36 UTC
In the Linux kernel, the following vulnerability has been resolved:

iommu/amd: serialize sequence allocation under concurrent TLB invalidations

With concurrent TLB invalidations, completion wait randomly gets timed out
because cmd_sem_val was incremented outside the IOMMU spinlock, allowing
CMD_COMPL_WAIT commands to be queued out of sequence and breaking the
ordering assumption in wait_on_sem().
Move the cmd_sem_val increment under iommu->lock so completion sequence
allocation is serialized with command queuing.
And remove the unnecessary return.


Note You need to log in before you can comment on or make changes to this bug.