Executive Summary

Informations
Name CVE-2023-52672 First vendor Publication 2024-05-17
Vendor Cve Last vendor Modification 2024-05-17

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

pipe: wakeup wr_wait after setting max_usage

Commit c73be61cede5 ("pipe: Add general notification queue support") a regression was introduced that would lock up resized pipes under certain conditions. See the reproducer in [1].

The commit resizing the pipe ring size was moved to a different function, doing that moved the wakeup for pipe->wr_wait before actually raising pipe->max_usage. If a pipe was full before the resize occured it would result in the wakeup never actually triggering pipe_write.

Set @max_usage and @nr_accounted before waking writers if this isn't a watch queue.

[Christian Brauner : rewrite to account for watch queues]

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52672

Sources (Detail)

https://git.kernel.org/stable/c/162ae0e78bdabf84ef10c1293c4ed7865cb7d3c8
https://git.kernel.org/stable/c/3efbd114b91525bb095b8ae046382197d92126b9
https://git.kernel.org/stable/c/68e51bdb1194f11d3452525b99c98aff6f837b24
https://git.kernel.org/stable/c/6fb70694f8d1ac34e45246b0ac988f025e1e5b55
https://git.kernel.org/stable/c/b87a1229d8668fbc78ebd9ca0fc797a76001c60f
https://git.kernel.org/stable/c/e95aada4cb93d42e25c30a0ef9eb2923d9711d4a
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2024-05-18 00:27:24
  • Multiple Updates
2024-05-17 21:27:25
  • First insertion