CVE-2025-71202 (GCVE-0-2025-71202)
Vulnerability from cvelistv5 – Published: 2026-02-14 15:36 – Updated: 2026-02-16 08:58
VLAI?
Title
iommu/sva: invalidate stale IOTLB entries for kernel address space
Summary
In the Linux kernel, the following vulnerability has been resolved:
iommu/sva: invalidate stale IOTLB entries for kernel address space
Introduce a new IOMMU interface to flush IOTLB paging cache entries for
the CPU kernel address space. This interface is invoked from the x86
architecture code that manages combined user and kernel page tables,
specifically before any kernel page table page is freed and reused.
This addresses the main issue with vfree() which is a common occurrence
and can be triggered by unprivileged users. While this resolves the
primary problem, it doesn't address some extremely rare case related to
memory unplug of memory that was present as reserved memory at boot, which
cannot be triggered by unprivileged users. The discussion can be found at
the link below.
Enable SVA on x86 architecture since the IOMMU can now receive
notification to flush the paging cache before freeing the CPU kernel page
table pages.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"arch/x86/Kconfig",
"drivers/iommu/iommu-sva.c",
"include/linux/iommu.h",
"mm/pgtable-generic.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "9f0a7ab700f8620e433b05c57fbd26c92ea186d9",
"status": "affected",
"version": "2f26e0a9c9860db290d63e9d85c2c8c09813677f",
"versionType": "git"
},
{
"lessThan": "e37d5a2d60a338c5917c45296bac65da1382eda5",
"status": "affected",
"version": "2f26e0a9c9860db290d63e9d85c2c8c09813677f",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"arch/x86/Kconfig",
"drivers/iommu/iommu-sva.c",
"include/linux/iommu.h",
"mm/pgtable-generic.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "4.4"
},
{
"lessThan": "4.4",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.7",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.19",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.7",
"versionStartIncluding": "4.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19",
"versionStartIncluding": "4.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/sva: invalidate stale IOTLB entries for kernel address space\n\nIntroduce a new IOMMU interface to flush IOTLB paging cache entries for\nthe CPU kernel address space. This interface is invoked from the x86\narchitecture code that manages combined user and kernel page tables,\nspecifically before any kernel page table page is freed and reused.\n\nThis addresses the main issue with vfree() which is a common occurrence\nand can be triggered by unprivileged users. While this resolves the\nprimary problem, it doesn\u0027t address some extremely rare case related to\nmemory unplug of memory that was present as reserved memory at boot, which\ncannot be triggered by unprivileged users. The discussion can be found at\nthe link below.\n\nEnable SVA on x86 architecture since the IOMMU can now receive\nnotification to flush the paging cache before freeing the CPU kernel page\ntable pages."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-16T08:58:38.840Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/9f0a7ab700f8620e433b05c57fbd26c92ea186d9"
},
{
"url": "https://git.kernel.org/stable/c/e37d5a2d60a338c5917c45296bac65da1382eda5"
}
],
"title": "iommu/sva: invalidate stale IOTLB entries for kernel address space",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-71202",
"datePublished": "2026-02-14T15:36:06.588Z",
"dateReserved": "2026-01-31T11:36:51.194Z",
"dateUpdated": "2026-02-16T08:58:38.840Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-71202\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-02-14T16:15:52.790\",\"lastModified\":\"2026-02-18T17:52:44.520\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\niommu/sva: invalidate stale IOTLB entries for kernel address space\\n\\nIntroduce a new IOMMU interface to flush IOTLB paging cache entries for\\nthe CPU kernel address space. This interface is invoked from the x86\\narchitecture code that manages combined user and kernel page tables,\\nspecifically before any kernel page table page is freed and reused.\\n\\nThis addresses the main issue with vfree() which is a common occurrence\\nand can be triggered by unprivileged users. While this resolves the\\nprimary problem, it doesn\u0027t address some extremely rare case related to\\nmemory unplug of memory that was present as reserved memory at boot, which\\ncannot be triggered by unprivileged users. The discussion can be found at\\nthe link below.\\n\\nEnable SVA on x86 architecture since the IOMMU can now receive\\nnotification to flush the paging cache before freeing the CPU kernel page\\ntable pages.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\\n\\niommu/sva: invalidar entradas IOTLB obsoletas para el espacio de direcciones del kernel\\n\\nSe introduce una nueva interfaz IOMMU para vaciar las entradas de la cach\u00e9 de paginaci\u00f3n IOTLB para el espacio de direcciones del kernel de la CPU. Esta interfaz se invoca desde el c\u00f3digo de arquitectura x86 que gestiona las tablas de p\u00e1ginas combinadas de usuario y kernel, espec\u00edficamente antes de que cualquier p\u00e1gina de tabla de p\u00e1ginas del kernel sea liberada y reutilizada.\\n\\nEsto aborda el problema principal con vfree(), que es una ocurrencia com\u00fan y puede ser activado por usuarios no privilegiados. Si bien esto resuelve el problema principal, no aborda un caso extremadamente raro relacionado con la desconexi\u00f3n de memoria que estaba presente como memoria reservada en el arranque, que no puede ser activado por usuarios no privilegiados. La discusi\u00f3n se puede encontrar en el enlace a continuaci\u00f3n.\\n\\nHabilitar SVA en la arquitectura x86 ya que la IOMMU ahora puede recibir notificaci\u00f3n para vaciar la cach\u00e9 de paginaci\u00f3n antes de liberar las p\u00e1ginas de la tabla de p\u00e1ginas del kernel de la CPU.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/9f0a7ab700f8620e433b05c57fbd26c92ea186d9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e37d5a2d60a338c5917c45296bac65da1382eda5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…