CVE-2025-39961

Source
https://cve.org/CVERecord?id=CVE-2025-39961
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39961.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-39961
Downstream
Related
Published
2025-10-09T12:13:22.029Z
Modified
2026-03-11T07:45:34.119451686Z
Summary
iommu/amd/pgtbl: Fix possible race while increase page table level
Details

In the Linux kernel, the following vulnerability has been resolved:

iommu/amd/pgtbl: Fix possible race while increase page table level

The AMD IOMMU host page table implementation supports dynamic page table levels (up to 6 levels), starting with a 3-level configuration that expands based on IOVA address. The kernel maintains a root pointer and current page table level to enable proper page table walks in allocpte()/fetchpte() operations.

The IOMMU IOVA allocator initially starts with 32-bit address and onces its exhuasted it switches to 64-bit address (max address is determined based on IOMMU and device DMA capability). To support larger IOVA, AMD IOMMU driver increases page table level.

But in unmap path (iommuv1unmappages()), fetchpte() reads pgtable->[root/mode] without lock. So its possible that in exteme corner case, when increaseaddressspace() is updating pgtable->[root/mode], fetchpte() reads wrong page table level (pgtable->mode). It does compare the value with level encoded in page table and returns NULL. This will result is iommuunmap ops to fail and upper layer may retry/log WARN_ON.

CPU 0 CPU 1 ------ ------ map pages unmap pages allocpte() -> increaseaddressspace() iommuv1unmappages() -> fetch_pte() pgtable->root = pte (new root value) READ pgtable->[mode/root] Reads new root, old mode Updates mode (pgtable->mode += 1)

Since Page table level updates are infrequent and already synchronized with a spinlock, implement seqcount to enable lock-free read operations on the read path.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39961.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
754265bcab78a9014f0f99cd35e0d610fcd7dfa7
Fixed
075abf0b1a958acfbea2435003d228e738e90346
Fixed
cd92c8ab336c3a633d46e6f35ebcd3509ae7db3b
Fixed
7d462bdecb7d9c32934dab44aaeb7ea7d73a27a2
Fixed
1e56310b40fd2e7e0b9493da9ff488af145bdd0c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
6fb92f18555a7b8e085267d513612dc0ff9a5360
Last affected
b15bf74405faa1a65025eb8a6eb337e140e5250a
Last affected
0d50f7b1e8c80a8c20db5049e269468c059b0378
Last affected
785ca708a908b9c596ede852470ba28b8dc3e40b

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39961.json"