{"vulnerability": "CVE-2024-53067", "sightings": [{"uuid": "042b8337-6a4b-4659-9601-6e0565760035", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53067", "type": "seen", "source": "https://t.me/cvedetector/11498", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53067 - Linux Kernel SCSI UFS Runtime Power Management Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53067 \nPublished : Nov. 19, 2024, 6:15 p.m. | 37\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nscsi: ufs: core: Start the RTC update work later  \n  \nThe RTC update work involves runtime resuming the UFS controller. Hence,  \nonly start the RTC update work after runtime power management in the UFS  \ndriver has been fully initialized. This patch fixes the following kernel  \ncrash:  \n  \nInternal error: Oops: 0000000096000006 [#1] PREEMPT SMP  \nWorkqueue: events ufshcd_rtc_work  \nCall trace:  \n _raw_spin_lock_irqsave+0x34/0x8c (P)  \n pm_runtime_get_if_active+0x24/0x9c (L)  \n pm_runtime_get_if_active+0x24/0x9c  \n ufshcd_rtc_work+0x138/0x1b4  \n process_one_work+0x148/0x288  \n worker_thread+0x2cc/0x3d4  \n kthread+0x110/0x114  \n ret_from_fork+0x10/0x20 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T20:10:37.000000Z"}]}