๐Ÿ” CVE Alert

CVE-2024-50058

UNKNOWN 0.0

serial: protect uart_port_dtr_rts() in uart_shutdown() too

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: serial: protect uart_port_dtr_rts() in uart_shutdown() too Commit af224ca2df29 (serial: core: Prevent unsafe uart port access, part 3) added few uport == NULL checks. It added one to uart_shutdown(), so the commit assumes, uport can be NULL in there. But right after that protection, there is an unprotected "uart_port_dtr_rts(uport, false);" call. That is invoked only if HUPCL is set, so I assume that is the reason why we do not see lots of these reports. Or it cannot be NULL at this point at all for some reason :P. Until the above is investigated, stay on the safe side and move this dereference to the if too. I got this inconsistency from Coverity under CID 1585130. Thanks.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
af224ca2df297440448b9d407d21b50982c6d532 < 2fe399bb8efd0d325ab1138cf8e3ecf23a39e96d af224ca2df297440448b9d407d21b50982c6d532 < 399927f0f875b93f3d5a0336d382ba48b8671eb2 af224ca2df297440448b9d407d21b50982c6d532 < d7b5876a6e74cdf8468a478be6b23f2f5464ac7a af224ca2df297440448b9d407d21b50982c6d532 < e418d91195d29d5f9c9685ff309b92b04b41dc40 af224ca2df297440448b9d407d21b50982c6d532 < 76ed24a34223bb2c6b6162e1d8389ec4e602a290 af224ca2df297440448b9d407d21b50982c6d532 < 602babaa84d627923713acaf5f7e9a4369e77473
Linux / Linux
4.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/2fe399bb8efd0d325ab1138cf8e3ecf23a39e96d git.kernel.org: https://git.kernel.org/stable/c/399927f0f875b93f3d5a0336d382ba48b8671eb2 git.kernel.org: https://git.kernel.org/stable/c/d7b5876a6e74cdf8468a478be6b23f2f5464ac7a git.kernel.org: https://git.kernel.org/stable/c/e418d91195d29d5f9c9685ff309b92b04b41dc40 git.kernel.org: https://git.kernel.org/stable/c/76ed24a34223bb2c6b6162e1d8389ec4e602a290 git.kernel.org: https://git.kernel.org/stable/c/602babaa84d627923713acaf5f7e9a4369e77473 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html