Description
In the Linux kernel, the following vulnerability has been resolved:

iommu/sva: Fix crash in iommu_sva_unbind_device()

domain->mm->iommu_mm can be freed by iommu_domain_free():
iommu_domain_free()
mmdrop()
__mmdrop()
mm_pasid_drop()
After iommu_domain_free() returns, accessing domain->mm->iommu_mm may
dereference a freed mm structure, leading to a crash.

Fix this by moving the code that accesses domain->mm->iommu_mm to before
the call to iommu_domain_free().
Published: 2026-04-03
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via kernel crash
Action: Apply Patch
AI Analysis

Impact

The vulnerability arises in the Linux kernel's IOMMU subsystem, where freeing an IOMMU domain leaves a pointer to the domain's memory‑management structure dangling. Subsequent code accesses this freed structure, causing a null or invalid pointer dereference that results in a kernel crash. This can be triggered when a device is unbound from an IOMMU domain, leading to a denial of service because the entire system may panic.

Affected Systems

The flaw is limited to the Linux operating system kernel, particularly code paths that invoke iommu_sva_unbind_device(). No specific kernel release versions are enumerated in the advisory, so all kernels containing this code path without the applied fix are potentially impacted. Systems running a kernel that has not integrated the patch commit are vulnerable.

Risk and Exploitability

The severity is high because a kernel crash can terminate critical services or bring the host down. While the CVSS score is not provided, use‑after‑free weaknesses typically receive high scores. The exploit requires that an attacker can cause the unbinding operation, which is usually privileged. Therefore, the attack vector is local with kernel privileges. Because the exploit is not publicly documented and the EPSS score is unavailable, the likelihood of exploitation remains uncertain, but the impact warrants immediate mitigation. The vulnerability is not listed in the CISA KEV catalog.

Generated by OpenCVE AI on April 3, 2026 at 18:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the kernel to a version that contains the fix commit 06e14c36e20b48171df13d51b89fe67c594ed07a or newer.
  • Verify that the operating system does not invoke iommu_sva_unbind_device on device removal while the domain is still in use.
  • If a timely kernel update is not possible, avoid using devices or drivers that trigger this unbind path, or restrict privileged access to kernel operators to reduce the attack surface.

Generated by OpenCVE AI on April 3, 2026 at 18:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 04 Apr 2026 01:15:00 +0000


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: iommu/sva: Fix crash in iommu_sva_unbind_device() domain->mm->iommu_mm can be freed by iommu_domain_free(): iommu_domain_free() mmdrop() __mmdrop() mm_pasid_drop() After iommu_domain_free() returns, accessing domain->mm->iommu_mm may dereference a freed mm structure, leading to a crash. Fix this by moving the code that accesses domain->mm->iommu_mm to before the call to iommu_domain_free().
Title iommu/sva: Fix crash in iommu_sva_unbind_device()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-03T15:15:15.856Z

Reserved: 2026-01-13T15:37:46.016Z

Link: CVE-2026-23429

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-03T16:16:24.210

Modified: 2026-04-03T16:16:24.210

Link: CVE-2026-23429

cve-icon Redhat

Severity :

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23429 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:16:22Z

Weaknesses