Description
In the Linux kernel, the following vulnerability has been resolved:

i3c: mipi-i3c-hci: Fix race in DMA ring dequeue

The HCI DMA dequeue path (hci_dma_dequeue_xfer()) may be invoked for
multiple transfers that timeout around the same time. However, the
function is not serialized and can race with itself.

When a timeout occurs, hci_dma_dequeue_xfer() stops the ring, processes
incomplete transfers, and then restarts the ring. If another timeout
triggers a parallel call into the same function, the two instances may
interfere with each other - stopping or restarting the ring at unexpected
times.

Add a mutex so that hci_dma_dequeue_xfer() is serialized with respect to
itself.
Published: 2026-05-08
Score: 7.0 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The i3c mipi‑i3c‑hci driver in the Linux kernel contains a race condition in its DMA dequeue routine. When several data transfers time out near one another, the hci_dma_dequeue_xfer() function can run concurrently, stopping and restarting the DMA ring out of sync. This lack of serialization can leave the ring in an inconsistent state and may cause the driver to malfunction.

Affected Systems

All Linux kernel releases that include the mipi‑i3c‑hci driver but have not yet applied the commit adding a mutex around hci_dma_dequeue_xfer() are affected. Kernel versions built before these changes are at risk.

Risk and Exploitability

The flaw is confined to the kernel and would likely require an attacker with local or elevated privileges to generate simultaneous transfer timeouts, a scenario that is usually limited to trusted users or code running on the host. The CVSS score of 7.0 indicates a medium‑high severity, the EPSS score is not available, and the vulnerability is not listed in CISA KEV. Remote exploitation is unlikely without such privileges, so the overall risk for systems that expose the mipi‑i3c‑hci interface to untrusted code is moderate.

Generated by OpenCVE AI on May 9, 2026 at 02:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that contains the commit adding the mutex to protect hci_dma_dequeue_xfer().
  • If a kernel upgrade cannot be performed immediately, restrict privileged access to the mipi‑i3c‑hci driver so that only trusted code can initiate DMA operations, reducing the possibility of concurrent timeouts.
  • Implement monitoring or logging of DMA ring start/stop events to detect unexpected state changes that could indicate a race condition is occurring.

Generated by OpenCVE AI on May 9, 2026 at 02:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-820
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Fri, 08 May 2026 19:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-362

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: i3c: mipi-i3c-hci: Fix race in DMA ring dequeue The HCI DMA dequeue path (hci_dma_dequeue_xfer()) may be invoked for multiple transfers that timeout around the same time. However, the function is not serialized and can race with itself. When a timeout occurs, hci_dma_dequeue_xfer() stops the ring, processes incomplete transfers, and then restarts the ring. If another timeout triggers a parallel call into the same function, the two instances may interfere with each other - stopping or restarting the ring at unexpected times. Add a mutex so that hci_dma_dequeue_xfer() is serialized with respect to itself.
Title i3c: mipi-i3c-hci: Fix race in DMA ring dequeue
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:21:10.282Z

Reserved: 2026-05-01T14:12:56.005Z

Link: CVE-2026-43353

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:46.043

Modified: 2026-05-08T15:16:46.043

Link: CVE-2026-43353

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43353 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T02:15:06Z

Weaknesses