CVE-2024-40977: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery During chip recovery (e.g. chip reset), there is a possible situation that kernel worker reset_work is holding the lock and waiting for kernel thread stat_worker to be parked, while stat_worker is waiting for the release of the same lock. It causes a deadlock resulting in the dumping of hung tasks messages and possible rebooting of the device. This patch prevents the execution of stat_worker during the chip recovery.
AI Analysis
Technical Summary
CVE-2024-40977 is a vulnerability identified in the Linux kernel specifically affecting the mt76 wireless driver for the mt7921s chipset. The issue arises during the chip recovery process, such as a chip reset, where a deadlock condition can occur between kernel worker threads. Specifically, the reset_work kernel worker holds a lock and waits for the stat_worker kernel thread to be parked, while stat_worker simultaneously waits for the release of the same lock. This circular wait creates a deadlock, causing the kernel to detect hung tasks and potentially triggering a system reboot. The vulnerability stems from improper synchronization and locking mechanisms during chip recovery operations in the wireless driver. The patch implemented prevents the execution of stat_worker during chip recovery, thereby breaking the deadlock cycle and stabilizing the system. This vulnerability affects Linux kernel versions containing the mt76 driver with the mt7921s chipset support, which is commonly used in various wireless devices. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability can lead to system instability and unexpected reboots on devices running affected Linux kernels with the mt7921s wireless chipset. This can disrupt network connectivity, especially in environments relying on wireless communications such as offices, industrial IoT deployments, and critical infrastructure. The deadlock and subsequent reboot can cause denial of service conditions, impacting availability of systems and services. Organizations with large-scale Linux deployments, including servers, embedded systems, or network appliances using this chipset, may experience operational interruptions. While the vulnerability does not directly expose confidentiality or integrity risks, the availability impact can affect business continuity and operational reliability. In sectors such as telecommunications, manufacturing, and public services where Linux-based wireless devices are prevalent, the disruption could have cascading effects. Additionally, the need for patching and system reboots to remediate the issue may require planned maintenance windows, impacting service uptime.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should promptly apply the Linux kernel patches that address CVE-2024-40977 once available from their Linux distribution vendors or kernel maintainers. It is critical to verify that the kernel version in use includes the fix preventing stat_worker execution during chip recovery. Organizations should audit their infrastructure to identify devices using the mt7921s chipset and mt76 driver. For embedded or IoT devices where kernel updates may be delayed, consider isolating affected devices from critical network segments to reduce impact. Monitoring system logs for hung task messages and unexpected reboots can help detect exploitation attempts or manifestation of the issue. Implementing robust change management and testing procedures before deploying kernel updates will minimize operational disruptions. Additionally, vendors and system integrators should be engaged to ensure timely firmware and driver updates for affected hardware. Network segmentation and redundancy can further reduce the impact of potential availability issues caused by this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2024-40977: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery During chip recovery (e.g. chip reset), there is a possible situation that kernel worker reset_work is holding the lock and waiting for kernel thread stat_worker to be parked, while stat_worker is waiting for the release of the same lock. It causes a deadlock resulting in the dumping of hung tasks messages and possible rebooting of the device. This patch prevents the execution of stat_worker during the chip recovery.
AI-Powered Analysis
Technical Analysis
CVE-2024-40977 is a vulnerability identified in the Linux kernel specifically affecting the mt76 wireless driver for the mt7921s chipset. The issue arises during the chip recovery process, such as a chip reset, where a deadlock condition can occur between kernel worker threads. Specifically, the reset_work kernel worker holds a lock and waits for the stat_worker kernel thread to be parked, while stat_worker simultaneously waits for the release of the same lock. This circular wait creates a deadlock, causing the kernel to detect hung tasks and potentially triggering a system reboot. The vulnerability stems from improper synchronization and locking mechanisms during chip recovery operations in the wireless driver. The patch implemented prevents the execution of stat_worker during chip recovery, thereby breaking the deadlock cycle and stabilizing the system. This vulnerability affects Linux kernel versions containing the mt76 driver with the mt7921s chipset support, which is commonly used in various wireless devices. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, this vulnerability can lead to system instability and unexpected reboots on devices running affected Linux kernels with the mt7921s wireless chipset. This can disrupt network connectivity, especially in environments relying on wireless communications such as offices, industrial IoT deployments, and critical infrastructure. The deadlock and subsequent reboot can cause denial of service conditions, impacting availability of systems and services. Organizations with large-scale Linux deployments, including servers, embedded systems, or network appliances using this chipset, may experience operational interruptions. While the vulnerability does not directly expose confidentiality or integrity risks, the availability impact can affect business continuity and operational reliability. In sectors such as telecommunications, manufacturing, and public services where Linux-based wireless devices are prevalent, the disruption could have cascading effects. Additionally, the need for patching and system reboots to remediate the issue may require planned maintenance windows, impacting service uptime.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should promptly apply the Linux kernel patches that address CVE-2024-40977 once available from their Linux distribution vendors or kernel maintainers. It is critical to verify that the kernel version in use includes the fix preventing stat_worker execution during chip recovery. Organizations should audit their infrastructure to identify devices using the mt7921s chipset and mt76 driver. For embedded or IoT devices where kernel updates may be delayed, consider isolating affected devices from critical network segments to reduce impact. Monitoring system logs for hung task messages and unexpected reboots can help detect exploitation attempts or manifestation of the issue. Implementing robust change management and testing procedures before deploying kernel updates will minimize operational disruptions. Additionally, vendors and system integrators should be engaged to ensure timely firmware and driver updates for affected hardware. Network segmentation and redundancy can further reduce the impact of potential availability issues caused by this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-07-12T12:17:45.603Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9827c4522896dcbe1573
Added to database: 5/21/2025, 9:08:55 AM
Last enriched: 6/29/2025, 2:57:07 AM
Last updated: 7/29/2025, 4:05:24 PM
Views: 13
Related Threats
CVE-2025-54475: CWE-89: Improper Neutralization of Special Elements used in an SQL Command in joomsky.com JS Jobs component for Joomla
HighCVE-2025-54474: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in dj-extensions.com DJ-Classifieds component for Joomla
HighCVE-2025-54473: CWE-434 Unrestricted Upload of File with Dangerous Type in phoca.cz phoca.cz - Phoca Commander for Joomla
CriticalCVE-2025-9050: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9047: SQL Injection in projectworlds Visitor Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.