CVE-2024-54458
📋 TL;DR
This CVE addresses a use-after-free vulnerability in the Linux kernel's UFS (Universal Flash Storage) BSG (Block SCSI Generic) subsystem. The vulnerability occurs when bsg_queue is not properly nullified after removal, potentially allowing attackers to execute arbitrary code or cause system crashes. This affects Linux systems with UFS storage support enabled.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local attacker gains kernel-level code execution, leading to complete system compromise, privilege escalation to root, or persistent backdoor installation.
Likely Case
System crash or kernel panic leading to denial of service, potentially requiring physical access or reboot to restore functionality.
If Mitigated
No impact if the vulnerable code path is not triggered or if proper kernel hardening measures are in place.
🎯 Exploit Status
Requires local access and knowledge of kernel exploitation techniques. No public exploits known at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Multiple stable kernel versions with commit hashes provided in references
Vendor Advisory: https://git.kernel.org/stable/c/1e95c798d8a7f70965f0f88d4657b682ff0ec75f
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version from your distribution's repositories. 2. Reboot system to load new kernel. 3. Verify kernel version after reboot.
🔧 Temporary Workarounds
Disable UFS BSG support
LinuxRemove or disable UFS BSG kernel module to prevent vulnerable code path
echo 'blacklist ufs_bsg' >> /etc/modprobe.d/blacklist-ufs-bsg.conf
rmmod ufs_bsg
🧯 If You Can't Patch
- Restrict local user access to systems with UFS storage
- Implement strict privilege separation and limit users who can access UFS devices
🔍 How to Verify
Check if Vulnerable:
Check if UFS BSG module is loaded: lsmod | grep ufs_bsg
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated and UFS BSG module version matches patched release
📡 Detection & Monitoring
Log Indicators:
- Kernel oops messages
- System crashes/panics related to UFS or SCSI
- Unexpected kernel module loading/unloading
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND ("UFS" OR "bsg" OR "scsi") AND ("panic" OR "oops" OR "segfault")
🔗 References
- https://git.kernel.org/stable/c/1e95c798d8a7f70965f0f88d4657b682ff0ec75f
- https://git.kernel.org/stable/c/22018622e1e9e371198dbd983af946a844d5924c
- https://git.kernel.org/stable/c/5e7b6e44468c3242c21c2a8656d009fb3eb50a73
- https://git.kernel.org/stable/c/5f782d4741bf558def60df192b858b0efc6a5f0a
- https://git.kernel.org/stable/c/88a01e9c9ad40c075756ba93b47984461d4ff15d
- https://git.kernel.org/stable/c/9193bdc170cc23fe98aca71d1a63c0bf6e1e853b
- https://git.kernel.org/stable/c/bb4783c670180b922267222408e1c48d22dfbb46
- https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html