CVE-2023-52672

In the Linux kernel, the following vulnerability has been resolved: pipe: wakeup wr_wait after setting max_usage Commit c73be61cede5 ("pipe: Add general notification queue support") a regression was introduced that would lock up resized pipes under certain conditions. See the reproducer in [1]. The commit resizing the pipe ring size was moved to a different function, doing that moved the wakeup for pipe->wr_wait before actually raising pipe->max_usage. If a pipe was full before the resize occured it would result in the wakeup never actually triggering pipe_write. Set @max_usage and @nr_accounted before waking writers if this isn't a watch queue. [Christian Brauner <brauner@kernel.org>: rewrite to account for watch queues]
Configurations

No configuration.

History

21 Nov 2024, 08:40

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/162ae0e78bdabf84ef10c1293c4ed7865cb7d3c8 - () https://git.kernel.org/stable/c/162ae0e78bdabf84ef10c1293c4ed7865cb7d3c8 -
References () https://git.kernel.org/stable/c/3efbd114b91525bb095b8ae046382197d92126b9 - () https://git.kernel.org/stable/c/3efbd114b91525bb095b8ae046382197d92126b9 -
References () https://git.kernel.org/stable/c/68e51bdb1194f11d3452525b99c98aff6f837b24 - () https://git.kernel.org/stable/c/68e51bdb1194f11d3452525b99c98aff6f837b24 -
References () https://git.kernel.org/stable/c/6fb70694f8d1ac34e45246b0ac988f025e1e5b55 - () https://git.kernel.org/stable/c/6fb70694f8d1ac34e45246b0ac988f025e1e5b55 -
References () https://git.kernel.org/stable/c/b87a1229d8668fbc78ebd9ca0fc797a76001c60f - () https://git.kernel.org/stable/c/b87a1229d8668fbc78ebd9ca0fc797a76001c60f -
References () https://git.kernel.org/stable/c/e95aada4cb93d42e25c30a0ef9eb2923d9711d4a - () https://git.kernel.org/stable/c/e95aada4cb93d42e25c30a0ef9eb2923d9711d4a -

04 Nov 2024, 13:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

03 Jul 2024, 01:43

Type Values Removed Values Added
CWE CWE-400
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.0

25 Jun 2024, 22:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: tubería: despertar wr_wait después de configurar max_usage Confirmar c73be61cede5 ("tubería: Agregar soporte de cola de notificaciones generales") se introdujo una regresión que bloquearía las tuberías redimensionadas bajo ciertas condiciones. Ver el reproductor en [1]. La confirmación de cambio de tamaño del anillo de tubería se movió a una función diferente, lo que movió la activación de pipe-&gt;wr_wait antes de aumentar pipe-&gt;max_usage. Si una tubería estaba llena antes de que ocurriera el cambio de tamaño, la reactivación nunca activaría pipe_write. Configure @max_usage y @nr_accounted antes de despertar a los escritores si no se trata de una cola de vigilancia. [Christian Brauner : reescribir en la cuenta para las colas de visualización]
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

17 May 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-17 14:15

Updated : 2024-11-21 08:40


NVD link : CVE-2023-52672

Mitre link : CVE-2023-52672

CVE.ORG link : CVE-2023-52672


JSON object : View

Products Affected

No product.

CWE
CWE-400

Uncontrolled Resource Consumption