DMA Transaction Management Issue in Linux Kernel Affects 8250 Serial Driver
CVE-2026-43061
What is CVE-2026-43061?
A vulnerability in the Linux kernel's 8250 serial driver has been identified that affects direct memory access (DMA) transaction management. When using DMA, the dmaengine_terminate_async function does not ensure the execution of the __dma_tx_complete callback, which is crucial for clearing the dma->tx_running state. If the transaction is halted and this callback does not execute, it results in a persistent state where new TX DMA transactions cannot be initiated. The recent fix ensures that the dma->tx_running flag is cleared upon the termination of a DMA transaction, thus allowing for proper management of subsequent transactions.
Affected Version(s)
Linux 7c47e637dfadfbc691dd297b91d81ef939ca2080 < 8190f9ab6ad90cb97652adbebd238b874a4ef70d
Linux bf3f395b9c37956eca866c9e1679769ed7dcce68 < 79a19bd936bb35f56ef0ccab1b3b59ebce8c762d
Linux d470522c597b73e63cca04f3012aec28185113b7