CVE-2024-57991

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-57991
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-57991.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-57991
Downstream
Published
2025-02-27T02:07:13.668Z
Modified
2025-12-05T08:31:24.955688Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
wifi: rtw89: chan: fix soft lockup in rtw89_entity_recalc_mgnt_roles()
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: chan: fix soft lockup in rtw89entityrecalcmgntroles()

During rtw89entityrecalcmgntroles(), there is a normalizing process which will re-order the list if an entry with target pattern is found. And once one is found, should have aborted the listforeachentry. But, break just aborted the inner for-loop. The outer listforeachentry still continues. Normally, only the first entry will match the target pattern, and the re-ordering will change nothing, so there won't be soft lockup. However, in some special cases, soft lockup would happen.

Fix it by goto fill to break from the listforeach_entry.

The following is a sample of kernel log for this problem.

watchdog: BUG: soft lockup - CPU#1 stuck for 26s! [wpasupplicant:2055] [...] RIP: 0010:rtw89entityrecalc ([...] chan.c:392 chan.c:479) rtw89core [...]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/57xxx/CVE-2024-57991.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0007546cb406be0dddf3d43f07683825affc6d4d
Fixed
223ba95fdcd3c6090e2bd51dce66abb6dd4f9df9
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
68ec751b288178de7d19b71ea61648269a35b8cd
Fixed
01d2d34e9fcc9897081c3c16a666f793c8a38c58
Fixed
e4790b3e314a4814f1680a5dc552031fb199b878

Affected versions

v6.*

v6.12
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.13
v6.13-rc1
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.13.1

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.2