๐Ÿ” CVE Alert

CVE-2024-57981

UNKNOWN 0.0

usb: xhci: Fix NULL pointer dereference on certain command aborts

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: usb: xhci: Fix NULL pointer dereference on certain command aborts If a command is queued to the final usable TRB of a ring segment, the enqueue pointer is advanced to the subsequent link TRB and no further. If the command is later aborted, when the abort completion is handled the dequeue pointer is advanced to the first TRB of the next segment. If no further commands are queued, xhci_handle_stopped_cmd_ring() sees the ring pointers unequal and assumes that there is a pending command, so it calls xhci_mod_cmd_timer() which crashes if cur_cmd was NULL. Don't attempt timer setup if cur_cmd is NULL. The subsequent doorbell ring likely is unnecessary too, but it's harmless. Leave it alone. This is probably Bug 219532, but no confirmation has been received. The issue has been independently reproduced and confirmed fixed using a USB MCU programmed to NAK the Status stage of SET_ADDRESS forever. Everything continued working normally after several prevented crashes.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 27, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
c311e391a7efd101250c0e123286709b7e736249 < fd8bfaeba4a85b14427899adec0efb3954300653 c311e391a7efd101250c0e123286709b7e736249 < b44253956407046e5907d4d72c8fa5b93ae94485 c311e391a7efd101250c0e123286709b7e736249 < cf30300a216a4f8dce94e11781a866a09d4b50d4 c311e391a7efd101250c0e123286709b7e736249 < 4ff18870af793ce2034a6ad746e91d0a3d985b88 c311e391a7efd101250c0e123286709b7e736249 < b649f0d5bc256f691c7d234c3986685d54053de1 c311e391a7efd101250c0e123286709b7e736249 < ae069cd2ba09a2bd6a87a68c59ef0b7ea39cd641 c311e391a7efd101250c0e123286709b7e736249 < 0ce5c0dac768be14afe2426101b568a0f66bfc4d c311e391a7efd101250c0e123286709b7e736249 < 1e0a19912adb68a4b2b74fd77001c96cd83eb073
Linux / Linux
3.16

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/fd8bfaeba4a85b14427899adec0efb3954300653 git.kernel.org: https://git.kernel.org/stable/c/b44253956407046e5907d4d72c8fa5b93ae94485 git.kernel.org: https://git.kernel.org/stable/c/cf30300a216a4f8dce94e11781a866a09d4b50d4 git.kernel.org: https://git.kernel.org/stable/c/4ff18870af793ce2034a6ad746e91d0a3d985b88 git.kernel.org: https://git.kernel.org/stable/c/b649f0d5bc256f691c7d234c3986685d54053de1 git.kernel.org: https://git.kernel.org/stable/c/ae069cd2ba09a2bd6a87a68c59ef0b7ea39cd641 git.kernel.org: https://git.kernel.org/stable/c/0ce5c0dac768be14afe2426101b568a0f66bfc4d git.kernel.org: https://git.kernel.org/stable/c/1e0a19912adb68a4b2b74fd77001c96cd83eb073 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-503939.html