摘要:
In the Linux kernel, the following vulnerability has been resolved:
xen/evtchn: avoid WARN() when unbinding an event channel
When unbinding a user event channel, the related handler might be
called a last time in case the kernel was built with
CONFIG_DEBUG_SHIRQ. This might cause a WARN() in the handler.
Avoid that by adding an "unbinding" flag to struct user_event which
will short circuit the handler.
安全等级: Low
公告ID: KylinSec-SA-2024-2133
发布日期: 2024年5月28日
关联CVE: CVE-2024-27067
In the Linux kernel, the following vulnerability has been resolved:
xen/evtchn: avoid WARN() when unbinding an event channel
When unbinding a user event channel, the related handler might be
called a last time in case the kernel was built with
CONFIG_DEBUG_SHIRQ. This might cause a WARN() in the handler.
Avoid that by adding an "unbinding" flag to struct user_event which
will short circuit the handler.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-27067 | KY3.4-4A | kernel | Unaffected |
CVE-2024-27067 | KY3.4-5 | kernel | Unaffected |
CVE-2024-27067 | KY3.5.1 | kernel | Unaffected |
CVE-2024-27067 | V6 | kernel | Unaffected |