Lucene search

K
nvd416baaa9-dc9f-4396-8d5f-8c081fb06d67NVD:CVE-2023-52672
HistoryMay 17, 2024 - 2:15 p.m.

CVE-2023-52672

2024-05-1714:15:10
416baaa9-dc9f-4396-8d5f-8c081fb06d67
web.nvd.nist.gov
linux kernel
pipe vulnerability
max usage
pipe write
resize
watch queue
cve-2023-52672

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%

In the Linux kernel, the following vulnerability has been resolved:

pipe: wakeup wr_wait after setting max_usage

Commit c73be61cede5 (“pipe: Add general notification queue support”) a
regression was introduced that would lock up resized pipes under certain
conditions. See the reproducer in [1].

The commit resizing the pipe ring size was moved to a different
function, doing that moved the wakeup for pipe->wr_wait before actually
raising pipe->max_usage. If a pipe was full before the resize occured it
would result in the wakeup never actually triggering pipe_write.

Set @max_usage and @nr_accounted before waking writers if this isn’t a
watch queue.

[Christian Brauner <[email protected]>: rewrite to account for watch queues]

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%