CVE-2024-27067
MEDIUMLinux Kernel - Info Disclosure
Title source: llmDescription
In the Linux kernel, the following vulnerability has been resolved: xen/evtchn: avoid WARN() when unbinding an event channel When unbinding a user event channel, the related handler might be called a last time in case the kernel was built with CONFIG_DEBUG_SHIRQ. This might cause a WARN() in the handler. Avoid that by adding an "unbinding" flag to struct user_event which will short circuit the handler.
References (4)
Scores
CVSS v3
5.5
EPSS
0.0002
EPSS Percentile
4.3%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Classification
Status
published
Affected Products (3)
linux/linux_kernel
< 6.6.23
linux/Kernel
< 6.6.23linux
linux/Kernel
< 6.8.2linux
Timeline
Published
May 01, 2024
Tracked Since
Feb 18, 2026