PT-2023-8764 · Linux +6 · Linux Kernel +6

Published

2023-12-08

·

Updated

2025-01-28

·

CVE-2023-52456

CVSS v3.1
5.5
VectorAV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Name of the Vulnerable Software and Affected Versions:

Linux kernel (affected versions not specified)

Description:

The issue is related to a deadlock in the tx statemachine when using the serial port as an RS485 port. This occurs when the TTY port is closed during a transmission, causing the interface to become useless. The `imx uart stop tx` function now checks for incomplete transmission and whether TC interrupts are enabled before bailing to be retriggered, ensuring the state machine handling is reached and properly set to WAIT AFTER SEND.

Recommendations:

At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

Improper Locking

Weakness Enumeration

Related Identifiers

ALT-PU-2024-17576
BDU:2024-01843
CVE-2023-52456
DLA-3841-1
OPENSUSE-SU-2024:13767-1
OPENSUSE-SU-2024_0858-1
OPENSUSE-SU-2025:14705-1
SUSE-SU-2024:0855-1
SUSE-SU-2024:0858-1
SUSE-SU-2024:0900-1
SUSE-SU-2024:0900-2
SUSE-SU-2024:0910-1
SUSE-SU-2024:0977-1
USN-6688-1
USN-6725-1
USN-6725-2
USN-6765-1
USN-6818-1
USN-6818-2
USN-6818-3
USN-6818-4
USN-6819-1
USN-6819-2
USN-6819-3
USN-6819-4

Affected Products

Alt Linux
Astra Linux
Linuxmint
Linux Kernel
Red Os
Suse
Ubuntu