In the Linux kernel, the following vulnerability has been resolved:
accel/ivpu: Fix WARN in ivpu_ipc_send_receive_internal()
Move pm_runtime_set_active() to ivpu_pm_init() so when
ivpu_ipc_send_receive_internal() is executed before ivpu_pm_enable()
it already has correct runtime state, even if last resume was
not successful.
Metrics
Affected Vendors & Products
References
History
Tue, 14 Jan 2025 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Sat, 11 Jan 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: accel/ivpu: Fix WARN in ivpu_ipc_send_receive_internal() Move pm_runtime_set_active() to ivpu_pm_init() so when ivpu_ipc_send_receive_internal() is executed before ivpu_pm_enable() it already has correct runtime state, even if last resume was not successful. | |
Title | accel/ivpu: Fix WARN in ivpu_ipc_send_receive_internal() | |
References |
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2025-01-11T12:35:41.727Z
Updated: 2025-01-11T12:35:41.727Z
Reserved: 2025-01-11T12:34:02.648Z
Link: CVE-2024-54193
Vulnrichment
No data.
NVD
Status : Received
Published: 2025-01-11T13:15:26.840
Modified: 2025-01-11T13:15:26.840
Link: CVE-2024-54193
Redhat