CVE-2024-27067

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2024
Last modified:
18/09/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> xen/evtchn: avoid WARN() when unbinding an event channel<br /> <br /> When unbinding a user event channel, the related handler might be<br /> called a last time in case the kernel was built with<br /> CONFIG_DEBUG_SHIRQ. This might cause a WARN() in the handler.<br /> <br /> Avoid that by adding an "unbinding" flag to struct user_event which<br /> will short circuit the handler.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.6.19 (including) 6.6.23 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.11 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8 (including) 6.8.2 (excluding)