CVE-2023-52672

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/05/2024
Last modified:
23/12/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> pipe: wakeup wr_wait after setting max_usage<br /> <br /> Commit c73be61cede5 ("pipe: Add general notification queue support") a<br /> regression was introduced that would lock up resized pipes under certain<br /> conditions. See the reproducer in [1].<br /> <br /> The commit resizing the pipe ring size was moved to a different<br /> function, doing that moved the wakeup for pipe-&gt;wr_wait before actually<br /> raising pipe-&gt;max_usage. If a pipe was full before the resize occured it<br /> would result in the wakeup never actually triggering pipe_write.<br /> <br /> Set @max_usage and @nr_accounted before waking writers if this isn&amp;#39;t a<br /> watch queue.<br /> <br /> [Christian Brauner : rewrite to account for watch queues]

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.8 (including) 5.10.210 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.149 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.76 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.15 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.3 (excluding)
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*