{"id":"CVE-2024-40977","summary":"wifi: mt76: mt7921s: fix potential hung tasks during chip recovery","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7921s: fix potential hung tasks during chip recovery\n\nDuring chip recovery (e.g. chip reset), there is a possible situation that\nkernel worker reset_work is holding the lock and waiting for kernel thread\nstat_worker to be parked, while stat_worker is waiting for the release of\nthe same lock.\nIt causes a deadlock resulting in the dumping of hung tasks messages and\npossible rebooting of the device.\n\nThis patch prevents the execution of stat_worker during the chip recovery.","modified":"2026-05-07T04:18:09.640878Z","published":"2024-07-12T12:32:13.447Z","related":["ALSA-2024:7000","ALSA-2024:7001","ALSA-2024:8617","SUSE-SU-2024:2894-1","SUSE-SU-2024:2939-1","SUSE-SU-2024:2947-1","SUSE-SU-2024:3194-1","SUSE-SU-2024:3195-1","SUSE-SU-2024:3383-1","SUSE-SU-2025:20044-1","SUSE-SU-2025:20047-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/40xxx/CVE-2024-40977.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0b81faa05b0b9feb3ae2d69be1d21f0d126ecb08"},{"type":"WEB","url":"https://git.kernel.org/stable/c/85edd783f4539a994d66c4c014d5858f490b7a02"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e974dd4c22a23ec3ce579fb6d31a674ac0435da9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ecf0b2b8a37c8464186620bef37812a117ff6366"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/40xxx/CVE-2024-40977.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40977"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"7bc04215a66b60e198aecaee8418f6d79fa19faa"},{"fixed":"0b81faa05b0b9feb3ae2d69be1d21f0d126ecb08"},{"fixed":"85edd783f4539a994d66c4c014d5858f490b7a02"},{"fixed":"e974dd4c22a23ec3ce579fb6d31a674ac0435da9"},{"fixed":"ecf0b2b8a37c8464186620bef37812a117ff6366"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-40977.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.16.0"},{"fixed":"6.1.96"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.36"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.9.7"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-40977.json"}}],"schema_version":"1.7.5"}