CVE-2024-57991: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: chan: fix soft lockup in rtw89_entity_recalc_mgnt_roles() During rtw89_entity_recalc_mgnt_roles(), there is a normalizing process which will re-order the list if an entry with target pattern is found. And once one is found, should have aborted the list_for_each_entry. But, `break` just aborted the inner for-loop. The outer list_for_each_entry still continues. Normally, only the first entry will match the target pattern, and the re-ordering will change nothing, so there won't be soft lockup. However, in some special cases, soft lockup would happen. Fix it by `goto fill` to break from the list_for_each_entry. The following is a sample of kernel log for this problem. watchdog: BUG: soft lockup - CPU#1 stuck for 26s! [wpa_supplicant:2055] [...] RIP: 0010:rtw89_entity_recalc ([...] chan.c:392 chan.c:479) rtw89_core [...]
AI Analysis
Technical Summary
CVE-2024-57991 is a vulnerability identified in the Linux kernel's wireless driver component, specifically within the Realtek rtw89 WiFi driver. The flaw exists in the function rtw89_entity_recalc_mgnt_roles(), which is responsible for recalculating management roles related to WiFi channel management. The vulnerability arises due to improper loop control during a list normalization process. When the function attempts to reorder a list upon finding an entry matching a target pattern, it uses a 'break' statement intended to exit the loop early. However, this 'break' only exits the inner for-loop, while the outer list_for_each_entry loop continues to iterate. Under typical conditions, only the first entry matches the pattern, so the reordering does not cause issues. In certain special cases, however, this leads to a soft lockup—a state where the CPU becomes unresponsive for an extended period, as evidenced by kernel watchdog logs showing the CPU stuck for over 26 seconds. This soft lockup can cause system instability or hangs, particularly affecting processes like wpa_supplicant that manage WiFi connections. The fix implemented involves replacing the 'break' with a 'goto fill' statement to properly exit the outer loop and prevent the lockup. This vulnerability affects specific Linux kernel versions identified by their commit hashes, and no known exploits are currently reported in the wild. The issue is primarily a denial-of-service (DoS) condition caused by a kernel soft lockup triggered by the WiFi driver malfunction.
Potential Impact
For European organizations, this vulnerability could lead to system instability or denial-of-service conditions on Linux-based systems utilizing the affected rtw89 WiFi driver. Since Linux is widely used in servers, embedded devices, and network infrastructure across Europe, organizations relying on affected kernel versions may experience unexpected system hangs or degraded network connectivity, impacting operational continuity. Critical infrastructure sectors such as telecommunications, manufacturing, and public services that depend on stable wireless connectivity could be particularly affected. Additionally, the soft lockup could disrupt WiFi-dependent applications or services, leading to productivity losses. Although no remote code execution or privilege escalation is indicated, the potential for service disruption in environments with high reliance on Linux wireless networking is significant. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or triggered lockups, which could be exploited in targeted denial-of-service scenarios.
Mitigation Recommendations
Organizations should promptly identify Linux systems running kernel versions containing the affected rtw89 driver commits and apply the official kernel patches that fix the loop control logic in rtw89_entity_recalc_mgnt_roles(). Since the vulnerability is in the kernel WiFi driver, updating to the latest stable Linux kernel releases that include this fix is the most effective mitigation. For systems where immediate kernel upgrades are not feasible, consider disabling the rtw89 WiFi driver if it is not essential or replacing affected hardware with devices using different drivers. Monitoring system logs for signs of soft lockups or CPU stalls related to the rtw89 driver can help detect attempts to trigger this issue. Network segmentation and limiting access to WiFi management interfaces can reduce the risk of exploitation. Additionally, organizations should maintain robust patch management processes to ensure timely deployment of kernel updates. Testing patches in staging environments before production rollout is recommended to avoid unintended disruptions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2024-57991: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: chan: fix soft lockup in rtw89_entity_recalc_mgnt_roles() During rtw89_entity_recalc_mgnt_roles(), there is a normalizing process which will re-order the list if an entry with target pattern is found. And once one is found, should have aborted the list_for_each_entry. But, `break` just aborted the inner for-loop. The outer list_for_each_entry still continues. Normally, only the first entry will match the target pattern, and the re-ordering will change nothing, so there won't be soft lockup. However, in some special cases, soft lockup would happen. Fix it by `goto fill` to break from the list_for_each_entry. The following is a sample of kernel log for this problem. watchdog: BUG: soft lockup - CPU#1 stuck for 26s! [wpa_supplicant:2055] [...] RIP: 0010:rtw89_entity_recalc ([...] chan.c:392 chan.c:479) rtw89_core [...]
AI-Powered Analysis
Technical Analysis
CVE-2024-57991 is a vulnerability identified in the Linux kernel's wireless driver component, specifically within the Realtek rtw89 WiFi driver. The flaw exists in the function rtw89_entity_recalc_mgnt_roles(), which is responsible for recalculating management roles related to WiFi channel management. The vulnerability arises due to improper loop control during a list normalization process. When the function attempts to reorder a list upon finding an entry matching a target pattern, it uses a 'break' statement intended to exit the loop early. However, this 'break' only exits the inner for-loop, while the outer list_for_each_entry loop continues to iterate. Under typical conditions, only the first entry matches the pattern, so the reordering does not cause issues. In certain special cases, however, this leads to a soft lockup—a state where the CPU becomes unresponsive for an extended period, as evidenced by kernel watchdog logs showing the CPU stuck for over 26 seconds. This soft lockup can cause system instability or hangs, particularly affecting processes like wpa_supplicant that manage WiFi connections. The fix implemented involves replacing the 'break' with a 'goto fill' statement to properly exit the outer loop and prevent the lockup. This vulnerability affects specific Linux kernel versions identified by their commit hashes, and no known exploits are currently reported in the wild. The issue is primarily a denial-of-service (DoS) condition caused by a kernel soft lockup triggered by the WiFi driver malfunction.
Potential Impact
For European organizations, this vulnerability could lead to system instability or denial-of-service conditions on Linux-based systems utilizing the affected rtw89 WiFi driver. Since Linux is widely used in servers, embedded devices, and network infrastructure across Europe, organizations relying on affected kernel versions may experience unexpected system hangs or degraded network connectivity, impacting operational continuity. Critical infrastructure sectors such as telecommunications, manufacturing, and public services that depend on stable wireless connectivity could be particularly affected. Additionally, the soft lockup could disrupt WiFi-dependent applications or services, leading to productivity losses. Although no remote code execution or privilege escalation is indicated, the potential for service disruption in environments with high reliance on Linux wireless networking is significant. The lack of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or triggered lockups, which could be exploited in targeted denial-of-service scenarios.
Mitigation Recommendations
Organizations should promptly identify Linux systems running kernel versions containing the affected rtw89 driver commits and apply the official kernel patches that fix the loop control logic in rtw89_entity_recalc_mgnt_roles(). Since the vulnerability is in the kernel WiFi driver, updating to the latest stable Linux kernel releases that include this fix is the most effective mitigation. For systems where immediate kernel upgrades are not feasible, consider disabling the rtw89 WiFi driver if it is not essential or replacing affected hardware with devices using different drivers. Monitoring system logs for signs of soft lockups or CPU stalls related to the rtw89 driver can help detect attempts to trigger this issue. Network segmentation and limiting access to WiFi management interfaces can reduce the risk of exploitation. Additionally, organizations should maintain robust patch management processes to ensure timely deployment of kernel updates. Testing patches in staging environments before production rollout is recommended to avoid unintended disruptions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-27T02:04:28.914Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9823c4522896dcbdebf8
Added to database: 5/21/2025, 9:08:51 AM
Last enriched: 6/28/2025, 9:40:58 AM
Last updated: 8/14/2025, 2:56:28 PM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.