vulnerability
Ubuntu: (Multiple Advisories) (CVE-2024-50058): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | 10/21/2024 | 02/20/2025 | 04/03/2025 |
Description
In the Linux kernel, the following vulnerability has been resolved:
serial: protect uart_port_dtr_rts() in uart_shutdown() too
Commit af224ca2df29 (serial: core: Prevent unsafe uart port access, part
3) added few uport == NULL checks. It added one to uart_shutdown(), so
the commit assumes, uport can be NULL in there. But right after that
protection, there is an unprotected "uart_port_dtr_rts(uport, false);"
call. That is invoked only if HUPCL is set, so I assume that is the
reason why we do not see lots of these reports.
Or it cannot be NULL at this point at all for some reason :P.
Until the above is investigated, stay on the safe side and move this
dereference to the if too.
I got this inconsistency from Coverity under CID 1585130. Thanks.
Solution(s)
References
- CVE-2024-50058
- https://attackerkb.com/topics/CVE-2024-50058
- UBUNTU-USN-7276-1
- UBUNTU-USN-7277-1
- UBUNTU-USN-7288-1
- UBUNTU-USN-7288-2
- UBUNTU-USN-7289-1
- UBUNTU-USN-7289-2
- UBUNTU-USN-7289-3
- UBUNTU-USN-7289-4
- UBUNTU-USN-7291-1
- UBUNTU-USN-7305-1
- UBUNTU-USN-7308-1
- UBUNTU-USN-7310-1
- UBUNTU-USN-7331-1
- UBUNTU-USN-7383-1
- UBUNTU-USN-7383-2
- UBUNTU-USN-7384-1
- UBUNTU-USN-7384-2
- UBUNTU-USN-7385-1
- UBUNTU-USN-7386-1
- UBUNTU-USN-7388-1
- UBUNTU-USN-7389-1
- UBUNTU-USN-7390-1
- UBUNTU-USN-7403-1

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.