PT-2026-37064 · Linux · Linux

Published

2026-05-05

·

Updated

2026-05-05

·

CVE-2026-43061

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
serial: 8250: Fix TX deadlock when using DMA
dmaengine terminate async does not guarantee that the dma tx complete callback will run. The callback is currently the only place where dma->tx running gets cleared. If the transaction is canceled and the callback never runs, then dma->tx running will never get cleared and we will never schedule new TX DMA transactions again.
This change makes it so we clear dma->tx running after we terminate the DMA transaction. This is "safe" because serial8250 tx dma flush is holding the UART port lock. The first thing the callback does is also grab the UART port lock, so access to dma->tx running is serialized.

Related Identifiers

CVE-2026-43061

Affected Products

Linux