Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1771 articles · 103891 vulns · 38/41 feeds (7d)
← Back to list
7.5
CVE-2026-23472EXPLOITEDPATCHED
linux · linux kernel

serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN

Description

In the Linux kernel, the following vulnerability has been resolved: serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN uart_write_room() and uart_write() behave inconsistently when xmit_buf is NULL (which happens for PORT_UNKNOWN ports that were never properly initialized): - uart_write_room() returns kfifo_avail() which can be > 0 - uart_write() checks xmit_buf and returns 0 if NULL This inconsistency causes an infinite loop in drivers that rely on tty_write_room() to determine if they can write: while (tty_write_room(tty) > 0) { written = tty->ops->write(...); // written is always 0, loop never exits } For example, caif_serial's handle_tx() enters an infinite loop when used with PORT_UNKNOWN serial ports, causing system hangs. Fix by making uart_write_room() also check xmit_buf and return 0 if it's NULL, consistent with uart_write(). Reproducer: https://gist.github.com/mrpre/d9a694cc0e19828ee3bc3b37983fde13

Affected Products

VendorProductVersions
linuxlinux kernel1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, 6.18.19, 6.19.9, 7.0-rc4

References

  • https://git.kernel.org/stable/c/efe85a557186b7fe915572ae93a8f3f78bfd9a22
  • https://git.kernel.org/stable/c/bc70f2b36cf474d5cc8ecbcaf57f3e326fdec67c
  • https://git.kernel.org/stable/c/455ce986fa356ff43a43c0d363ba95fa152f21d5

Related News (2 articles)

Tier C
VulDB4h ago
CVE-2026-23472 | Linux Kernel up to 6.18.19/6.19.9/7.0-rc4 serial handle_tx infinite loop
→ No new info (linked only)
Tier C
Linux Kernel CVEs5h ago
CVE-2026-23472: serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN
→ No new info (linked only)
CVSS 3.17.5 CRITICAL
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
efe85a557186b7fe915572ae93a8f3f78bfd9a22bc70f2b36cf474d5cc8ecbcaf57f3e326fdec67c455ce986fa356ff43a43c0d363ba95fa152f21d56.18.206.19.107.0-rc5
CWECWE-835
PublishedApr 3, 2026
Last enriched4h agov3
Trending Score60
Source articles2
Independent2
Info Completeness10/14
Missing: epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-23461EXP
Bluetooth: L2CAP: Fix use-after-free in l2cap_unregister_user
Trending: 60
CRITICALCVE-2026-23475EXP
spi: fix statistics allocation
Trending: 60
CRITICALCVE-2026-23452EXP
PM: runtime: Fix a race condition related to device removal
Trending: 60
CRITICALCVE-2026-23443EXP
ACPI: processor: Fix previous acpi_processor_errata_piix4() fix
Trending: 60
CRITICALCVE-2026-23467EXP
drm/i915/dmc: Fix an unlikely NULL pointer deference at probe
Trending: 60

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 3, 2026
Discovered by ZDM
Apr 3, 2026
Actively Exploited
Apr 3, 2026
Exploit Available
Apr 3, 2026
Patch Available
Apr 3, 2026
Updated: description, severity, cvssEstimate, cweIds, exploitAvailable, activelyExploited
Apr 3, 2026
Updated: affectedVersions, severity
Apr 3, 2026

Version History

v3
Last enriched 4h ago
v3Tier C4h ago

Updated affected versions to include 6.18.19, 6.19.9, and 7.0-rc4, changed severity to CRITICAL, and noted no patch available.

affectedVersionsseverity
via VulDB
v2Tier C5h ago

Updated description with additional details, changed severity to HIGH, updated CVSS estimate to 7.5, added CWE-835, and marked exploit availability and active exploitation as true.

descriptionseveritycvssEstimatecweIdsexploitAvailableactivelyExploited
via Linux Kernel CVEs
v15h ago

Initial creation