In the Linux kernel, the following vulnerability has been resolved:
tty: serial: fsl_lpuart: fix race on RX DMA shutdown
From time to time DMA completion can come in the middle of DMA shutdown:
<process ctx>: <IRQ>:
lpuart32_shutdown()
lpuart_dma_shutdown()
del_timer_sync()
lpuart_dma_rx_complete()
lpuart_copy_rx_to_tty()
mod_timer()
lpuart_dma_rx_free()
When the timer fires a bit later, sport->dma_rx_desc is NULL:
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000004
pc : lpuart_copy_rx_to_tty+0xcc/0x5bc
lr : lpuart_timer_func+0x1c/0x2c
Call trace:
lpuart_copy_rx_to_tty
lpuart_timer_func
call_timer_fn
__run_timers.part.0
run_timer_softirq
__do_softirq
__irq_exit_rcu
irq_exit
handle_domain_irq
gic_handle_irq
call_on_irq_stack
do_interrupt_handler
...
To fix this fold del_timer_sync() into lpuart_dma_rx_free() after
dmaengine_terminate_sync() to make sure timer will not be re-started in
lpuart_copy_rx_to_tty() <= lpuart_dma_rx_complete().
References
Configurations
Configuration 1 (hide)
|
History
12 Nov 2025, 21:00
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
| First Time |
Linux
Linux linux Kernel |
|
| CWE | CWE-362 | |
| References | () https://git.kernel.org/stable/c/19a98d56dfedafb25652bdb9cd48a4e73ceba702 - Patch | |
| References | () https://git.kernel.org/stable/c/1be6f2b15f902c02e055ae0b419ca789200473c9 - Patch | |
| References | () https://git.kernel.org/stable/c/2a36b444cace9580380467fd1183bb5e85bcc80a - Patch | |
| References | () https://git.kernel.org/stable/c/90530e7214c8a04dcdde57502d93fa96af288c38 - Patch | |
| References | () https://git.kernel.org/stable/c/954fc9931f0aabf272b5674cf468affdd88d3a36 - Patch |
05 May 2025, 20:54
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
02 May 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-02 16:15
Updated : 2025-11-12 21:00
NVD link : CVE-2023-53094
Mitre link : CVE-2023-53094
CVE.ORG link : CVE-2023-53094
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
