CVE-2024-27067 Affecting kernel-rt-devel package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-KERNELRTDEVEL-6800880
- published 2 May 2024
- disclosed 1 May 2024
Introduced: 1 May 2024
CVE-2024-27067 Open this link in a new tabHow to fix?
There is no fixed version for Centos:7
kernel-rt-devel
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-rt-devel
package and not the kernel-rt-devel
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
xen/evtchn: avoid WARN() when unbinding an event channel
When unbinding a user event channel, the related handler might be called a last time in case the kernel was built with CONFIG_DEBUG_SHIRQ. This might cause a WARN() in the handler.
Avoid that by adding an "unbinding" flag to struct user_event which will short circuit the handler.
References
- https://access.redhat.com/security/cve/CVE-2024-27067
- https://git.kernel.org/stable/c/35485dad6e28f9b17884764d4692b1655cb848d0
- https://git.kernel.org/stable/c/51c23bd691c0f1fb95b29731c356c6fd69925d17
- https://git.kernel.org/stable/c/99e425032c6ec13584d3cd33846e0c7307501b47
- https://git.kernel.org/stable/c/9e2d4b58c1da48a32905802aaeadba7084b46895