In the Linux kernel, the following vulnerability has been resolved:
xen/evtchn: avoid WARN() when unbinding an event channel
When unbinding a user event channel, the related handler might be
called a last time in case the kernel was built with
CONFIG_DEBUG_SHIRQ. This might cause a WARN() in the handler.
Avoid that by adding an "unbinding" flag to struct user_event which
will short circuit the handler.
References
Configurations
Configuration 1 (hide)
|
History
18 Sep 2025, 16:55
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | NVD-CWE-noinfo | |
First Time |
Linux
Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/35485dad6e28f9b17884764d4692b1655cb848d0 - Patch | |
References | () https://git.kernel.org/stable/c/51c23bd691c0f1fb95b29731c356c6fd69925d17 - Patch | |
References | () https://git.kernel.org/stable/c/99e425032c6ec13584d3cd33846e0c7307501b47 - Patch | |
References | () https://git.kernel.org/stable/c/9e2d4b58c1da48a32905802aaeadba7084b46895 - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
21 Nov 2024, 09:03
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://git.kernel.org/stable/c/35485dad6e28f9b17884764d4692b1655cb848d0 - | |
References | () https://git.kernel.org/stable/c/51c23bd691c0f1fb95b29731c356c6fd69925d17 - | |
References | () https://git.kernel.org/stable/c/99e425032c6ec13584d3cd33846e0c7307501b47 - | |
References | () https://git.kernel.org/stable/c/9e2d4b58c1da48a32905802aaeadba7084b46895 - |
01 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-01 13:15
Updated : 2025-09-18 16:55
NVD link : CVE-2024-27067
Mitre link : CVE-2024-27067
CVE.ORG link : CVE-2024-27067
JSON object : View
Products Affected
linux
- linux_kernel
CWE