PT-2026-37064 · Linux · Linux
Published
2026-05-05
·
Updated
2026-05-05
·
CVE-2026-43061
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
serial: 8250: Fix TX deadlock when using DMA
dmaengine terminate async does not guarantee that the
dma tx complete callback will run. The callback is currently the
only place where dma->tx running gets cleared. If the transaction is
canceled and the callback never runs, then dma->tx running will never
get cleared and we will never schedule new TX DMA transactions again.This change makes it so we clear
dma->tx running after we terminate
the DMA transaction. This is "safe" because serial8250 tx dma flush
is holding the UART port lock. The first thing the callback does is also
grab the UART port lock, so access to dma->tx running is serialized. Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux