CVE-2024-27060

5.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in the Linux kernel's Thunderbolt subsystem allows local attackers to cause a kernel panic (denial of service) when connecting certain Thunderbolt 1 devices. This affects systems with Thunderbolt support enabled in the kernel. The vulnerability occurs specifically when devices with only one lane adapter are connected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific affected versions not explicitly stated in CVE, but patches available for stable kernel branches
Operating Systems: Linux distributions with Thunderbolt support
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Thunderbolt support enabled in kernel and when connecting Thunderbolt 1 devices with single lane adapters.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash and denial of service, potentially causing data loss or service disruption.

🟠

Likely Case

System crash when connecting Thunderbolt 1 devices with single lane adapters, requiring reboot to restore functionality.

🟢

If Mitigated

No impact if Thunderbolt is disabled or vulnerable kernel versions are not used.

🌐 Internet-Facing: LOW - Requires physical access or local user access to trigger via Thunderbolt device connection.
🏢 Internal Only: MEDIUM - Local users with physical access to Thunderbolt ports can cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires physical access to connect Thunderbolt device or local user with Thunderbolt port access. No authentication bypass needed beyond physical/local access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched in stable kernel versions via commits: 440fba897c5ae32d7df1f1d609dbb19e2bba7fbb, ce64ba1f6ec3439e4b4d880b4db99673f4507228, d3d17e23d1a0d1f959b4fa55b35f1802d9c584fa

Vendor Advisory: https://git.kernel.org/stable/c/440fba897c5ae32d7df1f1d609dbb19e2bba7fbb

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Check distribution-specific security advisories. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable Thunderbolt support

linux

Disable Thunderbolt kernel module to prevent vulnerability trigger

echo 'blacklist thunderbolt' >> /etc/modprobe.d/blacklist-thunderbolt.conf
update-initramfs -u
reboot

Restrict Thunderbolt device connections

linux

Use Thunderbolt security levels to restrict unauthorized device connections

echo 1 > /sys/bus/thunderbolt/devices/0-0/authorized

🧯 If You Can't Patch

  • Physically disable Thunderbolt ports if possible
  • Implement strict physical access controls to prevent unauthorized Thunderbolt device connections

🔍 How to Verify

Check if Vulnerable:

Check kernel version and Thunderbolt module loading: 'lsmod | grep thunderbolt' and 'uname -r'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated to include fix commits, check Thunderbolt functionality with test devices

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs mentioning 'NULL pointer dereference' in thunderbolt module
  • System crash/reboot events after Thunderbolt device connection

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND "NULL pointer dereference" AND "thunderbolt" OR source="system" AND event="crash" AND "Thunderbolt"

🔗 References

📤 Share & Export