CVE-2024-57981
📋 TL;DR
A NULL pointer dereference vulnerability in the Linux kernel's xHCI USB driver can cause kernel crashes when certain USB commands are aborted. This affects Linux systems using the xHCI USB controller. The vulnerability leads to denial of service but not privilege escalation.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, requiring physical or remote reboot.
Likely Case
System crash when specific USB command abortion scenarios occur, causing temporary unavailability.
If Mitigated
No impact if patched; unpatched systems may experience crashes under specific USB command conditions.
🎯 Exploit Status
Exploitation requires physical or virtual USB device access to trigger command abortion scenarios.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions with commits 0ce5c0dac768be14afe2426101b568a0f66bfc4d or later
Vendor Advisory: https://git.kernel.org/stable/c/0ce5c0dac768be14afe2426101b568a0f66bfc4d
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version. 2. Reboot system to load new kernel. 3. Verify kernel version matches patched commit.
🔧 Temporary Workarounds
Disable vulnerable USB controllers
linuxTemporarily disable xHCI USB controllers if not needed.
echo 'blacklist xhci_hcd' > /etc/modprobe.d/blacklist-xhci.conf
reboot
🧯 If You Can't Patch
- Restrict physical USB device access to trusted devices only.
- Monitor system logs for kernel panic events related to USB commands.
🔍 How to Verify
Check if Vulnerable:
Check kernel version and compare with patched commits; examine if xHCI driver is loaded.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes the fix commit; test with USB device that previously triggered issue.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- NULL pointer dereference errors in dmesg
- USB command abortion logs
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND "NULL pointer dereference" AND "xhci"
🔗 References
- https://git.kernel.org/stable/c/0ce5c0dac768be14afe2426101b568a0f66bfc4d
- https://git.kernel.org/stable/c/1e0a19912adb68a4b2b74fd77001c96cd83eb073
- https://git.kernel.org/stable/c/4ff18870af793ce2034a6ad746e91d0a3d985b88
- https://git.kernel.org/stable/c/ae069cd2ba09a2bd6a87a68c59ef0b7ea39cd641
- https://git.kernel.org/stable/c/b44253956407046e5907d4d72c8fa5b93ae94485
- https://git.kernel.org/stable/c/b649f0d5bc256f691c7d234c3986685d54053de1
- https://git.kernel.org/stable/c/cf30300a216a4f8dce94e11781a866a09d4b50d4
- https://git.kernel.org/stable/c/fd8bfaeba4a85b14427899adec0efb3954300653
- https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html