Executive Summary

Informations
Name CVE-2024-27067 First vendor Publication 2024-05-01
Vendor Cve Last vendor Modification 2024-05-01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

xen/evtchn: avoid WARN() when unbinding an event channel

When unbinding a user event channel, the related handler might be called a last time in case the kernel was built with CONFIG_DEBUG_SHIRQ. This might cause a WARN() in the handler.

Avoid that by adding an "unbinding" flag to struct user_event which will short circuit the handler.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27067

Sources (Detail)

https://git.kernel.org/stable/c/35485dad6e28f9b17884764d4692b1655cb848d0
https://git.kernel.org/stable/c/51c23bd691c0f1fb95b29731c356c6fd69925d17
https://git.kernel.org/stable/c/99e425032c6ec13584d3cd33846e0c7307501b47
https://git.kernel.org/stable/c/9e2d4b58c1da48a32905802aaeadba7084b46895
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2024-05-02 00:27:26
  • Multiple Updates
2024-05-01 17:27:27
  • First insertion