CVE-2024-47673

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-47673
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-47673.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-47673
Downstream
Related
Published
2024-10-09T15:15:15Z
Modified
2025-08-09T19:01:27Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: pause TCM when the firmware is stopped

Not doing so will make us send a host command to the transport while the firmware is not alive, which will trigger a WARNING.

bad state = 0 WARNING: CPU: 2 PID: 17434 at drivers/net/wireless/intel/iwlwifi/iwl-trans.c:115 iwltranssendcmd+0x1cb/0x1e0 [iwlwifi] RIP: 0010:iwltranssendcmd+0x1cb/0x1e0 [iwlwifi] Call Trace: <TASK> iwlmvmsendcmd+0x40/0xc0 [iwlmvm] iwlmvmconfigscan+0x198/0x260 [iwlmvm] iwlmvmrecalctcm+0x730/0x11d0 [iwlmvm] iwlmvmtcmwork+0x1d/0x30 [iwlmvm] processonework+0x29e/0x640 workerthread+0x2df/0x690 ? rescuerthread+0x540/0x540 kthread+0x192/0x1e0 ? setkthreadstruct+0x90/0x90 retfromfork+0x22/0x30

References

Affected packages