The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-43345

CVE-2026-43345: Linux Kernel DoS Vulnerability

CVE-2026-43345 is a denial of service flaw in Linux Kernel affecting IPA v5.0+ event ring index programming. This causes system hangs and non-functional data paths. This article covers technical details, affected versions, and fixes.

Published: May 18, 2026

CVE-2026-43345 Overview

CVE-2026-43345 is a Linux kernel vulnerability in the IP Accelerator (IPA) networking driver affecting Qualcomm IPA v5.0 and later hardware. The flaw stems from an incorrect register field identifier used in the v5.0 register definition for the Generic Software Interface (GSI) channel context. Without a valid event ring index programmed, GSI channels cannot signal transfer completions. This causes gsi_channel_trans_quiesce() to block indefinitely in wait_for_completion(). The result is that runtime suspend, system suspend, and remoteproc stop operations hang forever, and the IPA data path becomes completely non-functional on affected devices.

Critical Impact

Affected systems experience a complete loss of IPA networking functionality and indefinite hangs in power management paths, producing a persistent denial-of-service condition on Qualcomm platforms using IPA v5.0+.

Affected Products

  • Linux Kernel 7.0-rc1 through 7.0-rc7
  • Linux Kernel branches incorporating the IPA v5.0+ driver register definitions
  • Qualcomm platforms using IPA v5.0, v5.1, and v5.2 hardware

Discovery Timeline

  • 2026-05-08 - CVE-2026-43345 published to NVD
  • 2026-05-15 - Last updated in NVD database

Technical Details for CVE-2026-43345

Vulnerability Analysis

The vulnerability resides in the Linux kernel net: ipa driver, specifically in the register field definitions for the GSI hardware block on IPA v5.0 and later revisions. Starting with IPA v5.0, the event ring index (ERINDEX) field was relocated from the CH_C_CNTXT_0 register to the CH_C_CNTXT_1 register. The driver's v5.0 register definition attempted to define this field within the CH_C_CNTXT_1 fmask array but referenced the legacy identifier ERINDEX instead of the correct CH_ERINDEX. As a result, the event ring index is never programmed into the channel context register at runtime.

Without a valid event ring association, the GSI channel hardware has no destination for transfer completion events. Completion interrupts are never generated, and any code path waiting on a completion stalls indefinitely.

Root Cause

The root cause is a register field identifier mismatch in the IPA driver's v5.0 register layout description. The fmask entry intended to populate the new CH_ERINDEX field used the obsolete ERINDEX symbol from the pre-v5.0 layout. The driver therefore writes the event ring index using a definition that targets the wrong register field, leaving the actual CH_C_CNTXT_1.CH_ERINDEX bits uninitialized. This is a configuration and design flaw in the register definition rather than a memory safety issue, classified under [NVD-CWE-noinfo].

Attack Vector

The vulnerability triggers under normal operating conditions on any system loading the affected driver on IPA v5.0+ hardware. Although the CVSS vector lists a network attack vector, exploitation does not require a crafted network input. Any traffic or system event that exercises the IPA data path or invokes power management transitions can reach the broken code path. The result is an availability impact: indefinite blocking in gsi_channel_trans_quiesce(), a non-functional data path, and hung suspend or remoteproc operations.

No verified public exploit code or proof-of-concept exists for this vulnerability. See the upstream patches in the Linux kernel stable tree for the corrected register field definition.

Detection Methods for CVE-2026-43345

Indicators of Compromise

  • Kernel tasks blocked in gsi_channel_trans_quiesce() or wait_for_completion() visible in /proc/<pid>/stack and dmesg hung-task warnings.
  • Runtime suspend, system suspend, or remoteproc stop operations that never complete on Qualcomm IPA-enabled platforms.
  • Loss of cellular or modem data connectivity with the IPA driver loaded and no traffic transiting GSI channels.

Detection Strategies

  • Inspect the running kernel version with uname -r and confirm whether it predates the upstream fix commits referenced in the vendor advisories.
  • Enable kernel hung-task detection (kernel.hung_task_timeout_secs) and review dmesg for stalls referencing GSI or IPA functions.
  • Audit fleet inventory of devices using Qualcomm IPA v5.0, v5.1, and v5.2 hardware against the patched kernel commit hashes.

Monitoring Recommendations

  • Forward kernel logs to a centralized logging platform and alert on hung-task warnings referencing gsi_ or ipa_ symbols.
  • Track power management telemetry for suspend cycles that exceed expected duration thresholds on mobile or embedded fleets.
  • Monitor IPA throughput counters and flag interfaces where the data path remains idle while link state is up.

How to Mitigate CVE-2026-43345

Immediate Actions Required

  • Update to a Linux kernel build that incorporates the upstream fix from the stable tree commits listed in the vendor advisories.
  • For vendor or downstream kernels, backport the register field identifier correction that replaces ERINDEX with CH_ERINDEX in the CH_C_CNTXT_1 fmask array.
  • Reboot affected systems after patching to clear any tasks already blocked in wait_for_completion().

Patch Information

Fixes are available in the upstream Linux kernel stable tree. Refer to the relevant commits: 2bf18b643c46, 2d2dc166d551, 34c988bb04cb, 56007972c0b1, and ae8343a19ccb. Distribution maintainers should pick up these commits in their stable kernel releases.

Workarounds

  • No reliable software workaround exists because the defect prevents the IPA data path from initializing correctly.
  • On platforms where the IPA driver is not required, blacklist or unload the ipa module to avoid the hang in power management code paths.
  • Disable runtime suspend and remoteproc stop operations on affected devices until a patched kernel is deployed, accepting the resulting power consumption impact.
bash
# Verify kernel version and IPA module status before applying patched kernel
uname -r
lsmod | grep -i ipa
dmesg | grep -Ei 'gsi|ipa|hung_task'

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechLinux Kernel

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.06%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • NVD-CWE-noinfo
  • Vendor Resources
  • Linux Kernel Commit Update

  • Linux Kernel Commit Update

  • Linux Kernel Commit Update

  • Linux Kernel Commit Update

  • Linux Kernel Commit Update
  • Related CVEs
  • CVE-2026-43329: Linux Kernel Netfilter DoS Vulnerability

  • CVE-2026-43331: Linux Kernel DOS Vulnerability

  • CVE-2026-43338: Linux Kernel DOS Vulnerability

  • CVE-2026-43325: Linux Kernel iwlwifi DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English