PatchSiren cyber security CVE debrief
CVE-2026-43220 Linux CVE debrief
CVE-2026-43220 is a Linux kernel AMD IOMMU availability issue where concurrent TLB invalidations could cause completion waits to time out. The problem was that cmd_sem_val was incremented outside the IOMMU spinlock, which let CMD_COMPL_WAIT commands be queued out of sequence and violate the ordering assumption in wait_on_sem(). The published fix serializes completion-sequence allocation under iommu->lock and removes an unnecessary return.
- Vendor
- Linux
- Product
- Unknown
- CVSS
- MEDIUM 5.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-06
- Original CVE updated
- 2026-05-17
- Advisory published
- 2026-05-06
- Advisory updated
- 2026-05-17
Who should care
Linux kernel maintainers, distro security teams, and operators running affected 6.6.x or 6.12.x kernel branches—especially systems using AMD IOMMU paths where local users or workloads could trigger the timing issue.
Technical summary
According to the CVE description, concurrent TLB invalidations exposed a race in the AMD IOMMU command path. cmd_sem_val was incremented outside the IOMMU spinlock, so CMD_COMPL_WAIT commands could be allocated out of order relative to queued invalidation commands. That broke the sequencing assumption used by wait_on_sem(), leading to random completion-wait timeouts. NVD lists the issue as affecting Linux kernel versions starting with 6.6.128 before 6.7, and 6.12.75 before 6.13.
Defensive priority
Moderate: prioritize patching affected kernel builds because the flaw can disrupt availability, but the published CVSS vector indicates local access and low privileges are required.
Recommended defensive actions
- Upgrade Linux kernel builds on affected branches to versions containing the upstream/stable fix.
- Prioritize hosts running AMD IOMMU-capable systems on the affected 6.6.x and 6.12.x lines.
- Verify vendor backports for your distribution rather than relying only on base version numbers.
- If immediate patching is delayed, reduce exposure by restricting local user access on systems where feasible and monitor for kernel log evidence of repeated completion-wait timeouts.
- Track the linked kernel patches and your distro advisories for backport status.
Evidence notes
The CVE description states the root cause: cmd_sem_val was incremented outside the IOMMU spinlock, allowing out-of-sequence CMD_COMPL_WAIT commands and timeout behavior in wait_on_sem(). NVD marks the vulnerability as modified and lists affected Linux kernel ranges as 6.6.128 through before 6.7, and 6.12.75 through before 6.13. The linked git.kernel.org references are official kernel patch and source references associated with the fix.
Official resources
-
CVE-2026-43220 CVE record
CVE.org
-
CVE-2026-43220 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Mitigation or vendor reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67 - Patch
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVE published by the source corpus on 2026-05-06T12:16:41.660Z and last modified on 2026-05-17T16:16:16.630Z. This debrief uses the published CVE date for timing context.