CVE-2024-27067Linux vulnerability

17 documents8 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 95.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 1
Latest updateJul 4

Description

In the Linux kernel, the following vulnerability has been resolved: xen/evtchn: avoid WARN() when unbinding an event channel When unbinding a user event channel, the related handler might be called a last time in case the kernel was built with CONFIG_DEBUG_SHIRQ. This might cause a WARN() in the handler. Avoid that by adding an "unbinding" flag to struct user_event which will short circuit the handler.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages9 packages

NVDlinux/linux_kernel6.6.196.6.23+2
Debianlinux/linux_kernel< 6.7.12-1+1
Ubuntulinux/linux_kernel< 6.8.0-35.35
CVEListV5linux/linux3c8f5965a99397368d3762a9814a21a3e442e1a499e425032c6ec13584d3cd33846e0c7307501b47+4
debiandebian/linux< linux 6.7.12-1 (forky)

Patches

🔴Vulnerability Details

7
OSV
linux-oracle vulnerabilities2024-07-04
OSV
linux-azure, linux-gke vulnerabilities2024-06-14
OSV
linux-oem-6.8 vulnerabilities2024-06-11
OSV
linux, linux-ibm, linux-lowlatency, linux-raspi vulnerabilities2024-06-07
OSV
linux-aws, linux-gcp vulnerabilities2024-06-07

📋Vendor Advisories

8
Ubuntu
Linux kernel (Oracle) vulnerabilities2024-07-04
Ubuntu
Linux kernel vulnerabilities2024-06-14
Ubuntu
Linux kernel (OEM) vulnerabilities2024-06-11
Ubuntu
Linux kernel vulnerabilities2024-06-07
Ubuntu
Linux kernel vulnerabilities2024-06-07

💬Community

1
Bugzilla
CVE-2024-27067 kernel: xen/evtchn: avoid WARN() when unbinding an event channel2024-05-01