CVE-2024-54193
accel/ivpu: Fix WARN in ivpu_ipc_send_receive_internal()
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: accel/ivpu: Fix WARN in ivpu_ipc_send_receive_internal() Move pm_runtime_set_active() to ivpu_pm_init() so when ivpu_ipc_send_receive_internal() is executed before ivpu_pm_enable() it already has correct runtime state, even if last resume was not successful.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Jan 11, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
8ed520ff4682aaaef7d124bd9c0950092fddb9c1 < 578874b2bb947e047708f4df286e4ff1ba6be3ad 8ed520ff4682aaaef7d124bd9c0950092fddb9c1 < 0f6482caa6acdfdfc744db7430771fe7e6c4e787
Linux / Linux
6.7