CVE-2024-27067

Source
https://cve.org/CVERecord?id=CVE-2024-27067
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27067.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-27067
Downstream
Related
Published
2024-05-01T13:04:16.051Z
Modified
2026-03-14T12:27:44.590209Z
Summary
xen/evtchn: avoid WARN() when unbinding an event channel
Details

In the Linux kernel, the following vulnerability has been resolved:

xen/evtchn: avoid WARN() when unbinding an event channel

When unbinding a user event channel, the related handler might be called a last time in case the kernel was built with CONFIGDEBUGSHIRQ. This might cause a WARN() in the handler.

Avoid that by adding an "unbinding" flag to struct user_event which will short circuit the handler.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27067.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3c8f5965a99397368d3762a9814a21a3e442e1a4
Fixed
99e425032c6ec13584d3cd33846e0c7307501b47
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9e90e58c11b74c2bddac4b2702cf79d36b981278
Fixed
35485dad6e28f9b17884764d4692b1655cb848d0
Fixed
9e2d4b58c1da48a32905802aaeadba7084b46895
Fixed
51c23bd691c0f1fb95b29731c356c6fd69925d17

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27067.json"