PT-2025-44126 · Intel +1 · Intel Vt-D +1

Published

2025-10-28

·

Updated

2025-10-28

·

CVE-2025-40058

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
Name of the Vulnerable Software and Affected Versions Linux kernel (affected versions not specified)
Description The Linux kernel contains a flaw in the IOMMU/VT-d component related to dirty page tracking. Dirty page tracking depends on the IOMMU atomically updating the dirty bit in the paging-structure entry, which requires coherent paging-structure memory between the IOMMU and the CPU. The Intel VT-d specification indicates that attempting to atomically update bits in a non-snooped paging-structure entry will result in a non-recoverable fault. The issue arises when an IOMMU is incorrectly configured for dirty page tracking while operating in an incoherent mode. This can occur if SSADS is supported without both ecap slads and ecap smpwc being supported.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Related Identifiers

CVE-2025-40058

Affected Products

Intel Vt-D
Linux Kernel