PT-2023-8764 · Linux +6 · Linux Kernel +6
Published
2023-12-08
·
Updated
2025-01-28
·
CVE-2023-52456
CVSS v3.1
5.5
5.5
Medium
Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Name of the Vulnerable Software and Affected Versions:
Linux kernel (affected versions not specified)
Description:
The issue is related to a deadlock in the tx statemachine when using the serial port as an RS485 port. This occurs when the TTY port is closed during a transmission, causing the interface to become useless. The `imx uart stop tx` function now checks for incomplete transmission and whether TC interrupts are enabled before bailing to be retriggered, ensuring the state machine handling is reached and properly set to WAIT AFTER SEND.
Recommendations:
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
Improper Locking
Related Identifiers
ALT-PU-2024-17576
BDU:2024-01843
CVE-2023-52456
DLA-3841-1
OPENSUSE-SU-2024:13767-1
OPENSUSE-SU-2024_0858-1
OPENSUSE-SU-2025:14705-1
SUSE-SU-2024:0855-1
SUSE-SU-2024:0858-1
SUSE-SU-2024:0900-1
SUSE-SU-2024:0900-2
SUSE-SU-2024:0910-1
SUSE-SU-2024:0977-1
USN-6688-1
USN-6725-1
USN-6725-2
USN-6765-1
USN-6818-1
USN-6818-2
USN-6818-3
USN-6818-4
USN-6819-1
USN-6819-2
USN-6819-3
USN-6819-4
Affected Products
Alt Linux
Astra Linux
Linuxmint
Linux Kernel
Red Os
Suse
Ubuntu
References · 1402
- 🔥 https://github.com/Notselwyn/CVE-2024-1086⭐ 2382 🔗 318 · Exploit
- 🔥 https://github.com/LLfam/CVE-2024-1086⭐ 15 🔗 2 · Exploit
- https://ubuntu.com/security/CVE-2023-52679 · Vendor Advisory
- https://ubuntu.com/security/CVE-2023-32254 · Vendor Advisory
- https://osv.dev/vulnerability/USN-6819-1 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595 · Security Note
- https://bdu.fstec.ru/vul/2023-08634 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52454 · Security Note
- https://ubuntu.com/security/CVE-2024-26583 · Vendor Advisory
- https://bdu.fstec.ru/vul/2024-01865 · Security Note
- https://ubuntu.com/security/CVE-2023-52444 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52494 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26583 · Security Note
- https://bdu.fstec.ru/vul/2024-00474 · Security Note