CVE-2023-52456

Source
https://cve.org/CVERecord?id=CVE-2023-52456
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52456.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52456
Downstream
Related
Published
2024-02-23T14:46:19.139Z
Modified
2026-03-14T12:16:46.355083Z
Summary
serial: imx: fix tx statemachine deadlock
Details

In the Linux kernel, the following vulnerability has been resolved:

serial: imx: fix tx statemachine deadlock

When using the serial port as RS485 port, the tx statemachine is used to control the RTS pin to drive the RS485 transceiver TXEN pin. When the TTY port is closed in the middle of a transmission (for instance during userland application crash), imxuartshutdown disables the interface and disables the Transmission Complete interrupt. afer that, imxuartstoptx bails on an incomplete transmission, to be retriggered by the TC interrupt. This interrupt is disabled and therefore the tx statemachine never transitions out of SEND. The statemachine is in deadlock now, and the TX_EN remains low, making the interface useless.

imxuartstoptx now checks for incomplete transmission AND whether TC interrupts are enabled before bailing to be retriggered. This makes sure the state machine handling is reached, and is properly set to WAITAFTER_SEND.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52456.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cb1a609236096c278ecbfb7be678a693a70283f1
Fixed
6e04a9d30509fb53ba6df5d655ed61d607a7cfda
Fixed
ff168d4fdb0e1ba35fb413a749b3d6cce918ec19
Fixed
63ee7be01a3f7d28b1ea8b8d7944f12bb7b0ed06
Fixed
763cd68746317b5d746dc2649a3295c1efb41181
Fixed
9a662d06c22ddfa371958c2071dc350436be802b
Fixed
78d60dae9a0c9f09aa3d6477c94047df2fe6f7b0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52456.json"