Vulnerability Details : CVE-2024-27067
In the Linux kernel, the following vulnerability has been resolved:
xen/evtchn: avoid WARN() when unbinding an event channel
When unbinding a user event channel, the related handler might be
called a last time in case the kernel was built with
CONFIG_DEBUG_SHIRQ. This might cause a WARN() in the handler.
Avoid that by adding an "unbinding" flag to struct user_event which
will short circuit the handler.
Products affected by CVE-2024-27067
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2024-27067
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 34 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-27067
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
N/A
|
N/A
|
RedHat-CVE-2024-27067 | 2024-05-01 |
References for CVE-2024-27067
-
https://git.kernel.org/stable/c/35485dad6e28f9b17884764d4692b1655cb848d0
xen/evtchn: avoid WARN() when unbinding an event channel - kernel/git/stable/linux.git - Linux kernel stable tree
-
https://git.kernel.org/stable/c/99e425032c6ec13584d3cd33846e0c7307501b47
xen/evtchn: avoid WARN() when unbinding an event channel - kernel/git/stable/linux.git - Linux kernel stable tree
-
https://git.kernel.org/stable/c/51c23bd691c0f1fb95b29731c356c6fd69925d17
xen/evtchn: avoid WARN() when unbinding an event channel - kernel/git/stable/linux.git - Linux kernel stable tree
-
https://git.kernel.org/stable/c/9e2d4b58c1da48a32905802aaeadba7084b46895
xen/evtchn: avoid WARN() when unbinding an event channel - kernel/git/stable/linux.git - Linux kernel stable tree
Jump to