Skip to main content

CVE-2024-57991: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-57991cvecve-2024-57991
Published: Thu Feb 27 2025 (02/27/2025, 02:07:13 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: chan: fix soft lockup in rtw89_entity_recalc_mgnt_roles() During rtw89_entity_recalc_mgnt_roles(), there is a normalizing process which will re-order the list if an entry with target pattern is found. And once one is found, should have aborted the list_for_each_entry. But, `break` just aborted the inner for-loop. The outer list_for_each_entry still continues. Normally, only the first entry will match the target pattern, and the re-ordering will change nothing, so there won't be soft lockup. However, in some special cases, soft lockup would happen. Fix it by `goto fill` to break from the list_for_each_entry. The following is a sample of kernel log for this problem. watchdog: BUG: soft lockup - CPU#1 stuck for 26s! [wpa_supplicant:2055] [...] RIP: 0010:rtw89_entity_recalc ([...] chan.c:392 chan.c:479) rtw89_core [...]

AI-Powered Analysis

AILast updated: 06/28/2025, 09:40:58 UTC

Technical Analysis

CVE-2024-57991 is a vulnerability identified in the Linux kernel's wireless driver component, specifically within the Realtek rtw89 WiFi driver. The flaw exists in the function rtw89_entity_recalc_mgnt_roles(), which is responsible for recalculating management roles related to WiFi channel management. The vulnerability arises due to improper loop control during a list normalization process. When the function attempts to reorder a list upon finding an entry matching a target pattern, it uses a 'break' statement intended to exit the loop early. However, this 'break' only exits the inner for-loop, while the outer list_for_each_entry loop continues to iterate. Under typical conditions, only the first entry matches the pattern, so the reordering does not cause issues. In certain special cases, however, this leads to a soft lockup—a state where the CPU becomes unresponsive for an extended period, as evidenced by kernel watchdog logs showing the CPU stuck for over 26 seconds. This soft lockup can cause system instability or hangs, particularly affecting processes like wpa_supplicant that manage WiFi connections. The fix implemented involves replacing the 'break' with a 'goto fill' statement to properly exit the outer loop and prevent the lockup. This vulnerability affects specific Linux kernel versions identified by their commit hashes, and no known exploits are currently reported in the wild. The issue is primarily a denial-of-service (DoS) condition caused by a kernel soft lockup triggered by the WiFi driver malfunction.

Potential Impact

For European organizations, this vulnerability could lead to system instability or denial-of-service conditions on Linux-based systems utilizing the affected rtw89 WiFi driver. Since Linux is widely used in servers, embedded devices, and network infrastructure across Europe, organizations relying on affected kernel versions may experience unexpected system hangs or degraded network connectivity, impacting operational continuity. Critical infrastructure sectors such as telecommunications, manufacturing, and public services that depend on stable wireless connectivity could be particularly affected. Additionally, the soft lockup could disrupt WiFi-dependent applications or services, leading to productivity losses. Although no remote code execution or privilege escalation is indicated, the potential for service disruption in environments with high reliance on Linux wireless networking is significant. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or triggered lockups, which could be exploited in targeted denial-of-service scenarios.

Mitigation Recommendations

Organizations should promptly identify Linux systems running kernel versions containing the affected rtw89 driver commits and apply the official kernel patches that fix the loop control logic in rtw89_entity_recalc_mgnt_roles(). Since the vulnerability is in the kernel WiFi driver, updating to the latest stable Linux kernel releases that include this fix is the most effective mitigation. For systems where immediate kernel upgrades are not feasible, consider disabling the rtw89 WiFi driver if it is not essential or replacing affected hardware with devices using different drivers. Monitoring system logs for signs of soft lockups or CPU stalls related to the rtw89 driver can help detect attempts to trigger this issue. Network segmentation and limiting access to WiFi management interfaces can reduce the risk of exploitation. Additionally, organizations should maintain robust patch management processes to ensure timely deployment of kernel updates. Testing patches in staging environments before production rollout is recommended to avoid unintended disruptions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-02-27T02:04:28.914Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9823c4522896dcbdebf8

Added to database: 5/21/2025, 9:08:51 AM

Last enriched: 6/28/2025, 9:40:58 AM

Last updated: 8/14/2025, 2:56:28 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats