CVE-2024-27067

In the Linux kernel, the following vulnerability has been resolved: xen/evtchn: avoid WARN() when unbinding an event channel When unbinding a user event channel, the related handler might be called a last time in case the kernel was built with CONFIG_DEBUG_SHIRQ. This might cause a WARN() in the handler. Avoid that by adding an "unbinding" flag to struct user_event which will short circuit the handler.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

18 Sep 2025, 16:55

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/35485dad6e28f9b17884764d4692b1655cb848d0 - () https://git.kernel.org/stable/c/35485dad6e28f9b17884764d4692b1655cb848d0 - Patch
References () https://git.kernel.org/stable/c/51c23bd691c0f1fb95b29731c356c6fd69925d17 - () https://git.kernel.org/stable/c/51c23bd691c0f1fb95b29731c356c6fd69925d17 - Patch
References () https://git.kernel.org/stable/c/99e425032c6ec13584d3cd33846e0c7307501b47 - () https://git.kernel.org/stable/c/99e425032c6ec13584d3cd33846e0c7307501b47 - Patch
References () https://git.kernel.org/stable/c/9e2d4b58c1da48a32905802aaeadba7084b46895 - () https://git.kernel.org/stable/c/9e2d4b58c1da48a32905802aaeadba7084b46895 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 Nov 2024, 09:03

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: xen/evtchn: evite WARN() al desvincular un canal de eventos Al desvincular un canal de eventos de usuario, es posible que se llame al controlador relacionado por última vez en caso de que el kernel se haya compilado con CONFIG_DEBUG_SHIRQ. Esto podría provocar un WARN() en el controlador. Evite esto agregando un indicador de "desvinculación" a la estructura user_event que provocará un cortocircuito en el controlador.
References () https://git.kernel.org/stable/c/35485dad6e28f9b17884764d4692b1655cb848d0 - () https://git.kernel.org/stable/c/35485dad6e28f9b17884764d4692b1655cb848d0 -
References () https://git.kernel.org/stable/c/51c23bd691c0f1fb95b29731c356c6fd69925d17 - () https://git.kernel.org/stable/c/51c23bd691c0f1fb95b29731c356c6fd69925d17 -
References () https://git.kernel.org/stable/c/99e425032c6ec13584d3cd33846e0c7307501b47 - () https://git.kernel.org/stable/c/99e425032c6ec13584d3cd33846e0c7307501b47 -
References () https://git.kernel.org/stable/c/9e2d4b58c1da48a32905802aaeadba7084b46895 - () https://git.kernel.org/stable/c/9e2d4b58c1da48a32905802aaeadba7084b46895 -

01 May 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-01 13:15

Updated : 2025-09-18 16:55


NVD link : CVE-2024-27067

Mitre link : CVE-2024-27067

CVE.ORG link : CVE-2024-27067


JSON object : View

Products Affected

linux

  • linux_kernel