Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: i3c: mipi-i3c-hci: Fix race in DMA ring dequeue The HCI DMA dequeue path (hci_dma_dequeue_xfer()) may be invoked for multiple transfers that timeout around the same time. However, the function is not serialized and can race with itself. When a timeout occurs, hci_dma_dequeue_xfer() stops the ring, processes incomplete transfers, and then restarts the ring. If another timeout triggers a parallel call into the same function, the two instances may interfere with each other - stopping or restarting the ring at unexpected times. Add a mutex so that hci_dma_dequeue_xfer() is serialized with respect to itself.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.11, < 6.18.19 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/1dca8aee80eea76d2aae21265de5dd64f6ba0f09Patch
- https://git.kernel.org/stable/c/4faa1e9c67a2229f6749190aedaf88ce0391efd2Patch
- https://git.kernel.org/stable/c/b684b420a5bb0ea1b0e13abfdb8ce41c5266e62ePatch
FAQ
What is CVE-2026-43353?
CVE-2026-43353 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: i3c: mipi-i3c-hci: Fix race in DMA ring dequeue The HCI DMA dequeue path (hci_dma_dequeue_xfer()) may be invoked for multiple tran...
How severe is CVE-2026-43353?
CVE-2026-43353 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-43353?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.