DEBIAN-CVE-2024-57991

Source
https://security-tracker.debian.org/tracker/CVE-2024-57991
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2024-57991.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2024-57991
Upstream
Published
2025-02-27T02:15:13.110Z
Modified
2025-11-19T02:04:41.692829Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: chan: fix soft lockup in rtw89entityrecalcmgntroles() During rtw89entityrecalcmgntroles(), there is a normalizing process which will re-order the list if an entry with target pattern is found. And once one is found, should have aborted the listforeachentry. But, break just aborted the inner for-loop. The outer listforeachentry still continues. Normally, only the first entry will match the target pattern, and the re-ordering will change nothing, so there won't be soft lockup. However, in some special cases, soft lockup would happen. Fix it by goto fill to break from the listforeachentry. The following is a sample of kernel log for this problem. watchdog: BUG: soft lockup - CPU#1 stuck for 26s! [wpasupplicant:2055] [...] RIP: 0010:rtw89entityrecalc ([...] chan.c:392 chan.c:479) rtw89_core [...]

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.13-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.12.13-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}