Impact
In the Linux kernel, a flaw in the IOMMU Shared Virtual Addressing (SVA) subsystem allows the kernel's page table entries to be cached, so that when a page is freed and later reused, the IOMMU may still hold stale entries. This stale cache can be exploited by an attacker to force the IOMMU to treat attacker‑controlled data as valid page table entries, culminating in use‑after‑free or write‑after‑free conditions that can lead to arbitrary DMA access or privilege escalation.
Affected Systems
This vulnerability affects the Linux kernel on systems that run on the x86 architecture with the IOMMU SVA feature enabled. Version information is not explicitly given, but any kernel build with CONFIG_X86 and SVA enabled is potentially affected. No specific kernel releases are listed.
Risk and Exploitability
The CVSS score of 7.8 indicates a high‑severity flaw, while the EPSS score of < 1 % shows a very low exploitation probability at the current time. The vulnerability is not listed in the CISA KEV catalog. Exploitability requires a device that interacts with the IOMMU; an attacker would need to trigger the stale cache through device‑side activity or other privileged interaction with the kernel page tables.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN