CVE-2024-27067

In the Linux kernel, the following vulnerability has been resolved: xen/evtchn: avoid WARN() when unbinding an event channel When unbinding a user event channel, the related handler might be called a last time in case the kernel was built with CONFIG_DEBUG_SHIRQ. This might cause a WARN() in the handler. Avoid that by adding an "unbinding" flag to struct user_event which will short circuit the handler.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

18 Sep 2025, 16:55

Type Values Removed Values Added
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/35485dad6e28f9b17884764d4692b1655cb848d0 - () https://git.kernel.org/stable/c/35485dad6e28f9b17884764d4692b1655cb848d0 - Patch
References () https://git.kernel.org/stable/c/51c23bd691c0f1fb95b29731c356c6fd69925d17 - () https://git.kernel.org/stable/c/51c23bd691c0f1fb95b29731c356c6fd69925d17 - Patch
References () https://git.kernel.org/stable/c/99e425032c6ec13584d3cd33846e0c7307501b47 - () https://git.kernel.org/stable/c/99e425032c6ec13584d3cd33846e0c7307501b47 - Patch
References () https://git.kernel.org/stable/c/9e2d4b58c1da48a32905802aaeadba7084b46895 - () https://git.kernel.org/stable/c/9e2d4b58c1da48a32905802aaeadba7084b46895 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel

Information

Published : 2024-05-01 13:15

Updated : 2025-09-18 16:55


NVD link : CVE-2024-27067

Mitre link : CVE-2024-27067

CVE.ORG link : CVE-2024-27067


JSON object : View

Products Affected

linux

  • linux_kernel