DEBIAN-CVE-2024-53132

Source
https://security-tracker.debian.org/tracker/CVE-2024-53132
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2024-53132.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2024-53132
Upstream
Published
2024-12-04T15:15:13Z
Modified
2025-09-25T04:20:05.717881Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: drm/xe/oa: Fix "Missing outer runtime PM protection" warning Fix the following drmWARN: [953.586396] xe 0000:00:02.0: [drm] Missing outer runtime PM protection ... <4> [953.587090] ? xepmruntimegetnoresume+0x8d/0xa0 [xe] <4> [953.587208] gucexecqueueaddmsg+0x28/0x130 [xe] <4> [953.587319] gucexecqueuefini+0x3a/0x40 [xe] <4> [953.587425] xeexecqueuedestroy+0xb3/0xf0 [xe] <4> [953.587515] xeoa_release+0x9c/0xc0 [xe] (cherry picked from commit b107c63d2953907908fd0cafb0e543b3c3167b75)

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.11.10-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.11.10-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}