{"vulnerability": "cve-2024-54193", "sightings": [{"uuid": "4d86276d-7ab5-423c-9659-6620d1888b32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54193", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1307", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-54193\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\naccel/ivpu: Fix WARN in ivpu_ipc_send_receive_internal()\n\nMove pm_runtime_set_active() to ivpu_pm_init() so when\nivpu_ipc_send_receive_internal() is executed before ivpu_pm_enable()\nit already has correct runtime state, even if last resume was\nnot successful.\n\ud83d\udccf Published: 2025-01-11T12:35:41.727Z\n\ud83d\udccf Modified: 2025-01-11T12:35:41.727Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/578874b2bb947e047708f4df286e4ff1ba6be3ad\n2. https://git.kernel.org/stable/c/0f6482caa6acdfdfc744db7430771fe7e6c4e787", "creation_timestamp": "2025-01-11T13:06:31.000000Z"}, {"uuid": "1970b3e3-6db3-415c-9924-4689f89d1f5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-54193", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhs573ez42i", "content": "", "creation_timestamp": "2025-01-11T13:16:53.337624Z"}]}