{"id":"CVE-2024-47673","summary":"wifi: iwlwifi: mvm: pause TCM when the firmware is stopped","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: pause TCM when the firmware is stopped\n\nNot doing so will make us send a host command to the transport while the\nfirmware is not alive, which will trigger a WARNING.\n\nbad state = 0\nWARNING: CPU: 2 PID: 17434 at drivers/net/wireless/intel/iwlwifi/iwl-trans.c:115 iwl_trans_send_cmd+0x1cb/0x1e0 [iwlwifi]\nRIP: 0010:iwl_trans_send_cmd+0x1cb/0x1e0 [iwlwifi]\nCall Trace:\n \u003cTASK\u003e\n iwl_mvm_send_cmd+0x40/0xc0 [iwlmvm]\n iwl_mvm_config_scan+0x198/0x260 [iwlmvm]\n iwl_mvm_recalc_tcm+0x730/0x11d0 [iwlmvm]\n iwl_mvm_tcm_work+0x1d/0x30 [iwlmvm]\n process_one_work+0x29e/0x640\n worker_thread+0x2df/0x690\n ? rescuer_thread+0x540/0x540\n kthread+0x192/0x1e0\n ? set_kthread_struct+0x90/0x90\n ret_from_fork+0x22/0x30","modified":"2026-03-20T12:38:02.795317Z","published":"2024-10-09T14:49:14.315Z","related":["MGASA-2024-0344","MGASA-2024-0345","SUSE-SU-2024:3983-1","SUSE-SU-2024:3984-1","SUSE-SU-2024:3985-1","SUSE-SU-2024:3986-1","SUSE-SU-2024:4100-1","SUSE-SU-2024:4318-1","SUSE-SU-2024:4364-1","SUSE-SU-2024:4387-1","SUSE-SU-2025:0034-1","SUSE-SU-2025:20163-1","SUSE-SU-2025:20164-1","SUSE-SU-2025:20246-1","SUSE-SU-2025:20247-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47673.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0668ebc8c2282ca1e7eb96092a347baefffb5fe7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2c61b561baf92a2860c76c2302a62169e22c21cc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/55086c97a55d781b04a2667401c75ffde190135c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5948a191906b54e10f02f6b7a7670243a39f99f4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a15df5f37fa3a8b7a8ec7a339d1e897bc524e28f"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47673.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-47673"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"7d9d0d562b54d2953304693f76bc2bbfbe318c27"},{"fixed":"a15df5f37fa3a8b7a8ec7a339d1e897bc524e28f"},{"fixed":"5948a191906b54e10f02f6b7a7670243a39f99f4"},{"fixed":"2c61b561baf92a2860c76c2302a62169e22c21cc"},{"fixed":"55086c97a55d781b04a2667401c75ffde190135c"},{"fixed":"0668ebc8c2282ca1e7eb96092a347baefffb5fe7"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47673.json"}}],"schema_version":"1.7.5"}