| Name | CVE-2024-47673 | 
| Description | In the Linux kernel, the following vulnerability has been resolved:  wifi: iwlwifi: mvm: pause TCM when the firmware is stopped  Not doing so will make us send a host command to the transport while the firmware is not alive, which will trigger a WARNING.  bad state = 0 WARNING: CPU: 2 PID: 17434 at drivers/net/wireless/intel/iwlwifi/iwl-trans.c:115 iwl_trans_send_cmd+0x1cb/0x1e0 [iwlwifi] RIP: 0010:iwl_trans_send_cmd+0x1cb/0x1e0 [iwlwifi] Call Trace:  <TASK>  iwl_mvm_send_cmd+0x40/0xc0 [iwlmvm]  iwl_mvm_config_scan+0x198/0x260 [iwlmvm]  iwl_mvm_recalc_tcm+0x730/0x11d0 [iwlmvm]  iwl_mvm_tcm_work+0x1d/0x30 [iwlmvm]  process_one_work+0x29e/0x640  worker_thread+0x2df/0x690  ? rescuer_thread+0x540/0x540  kthread+0x192/0x1e0  ? set_kthread_struct+0x90/0x90  ret_from_fork+0x22/0x30 | 
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) | 
| References | DLA-4008-1 | 
The table below lists information on source packages.
The information below is based on the following data on fixed versions.