Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-23138


In the Linux kernel, the following vulnerability has been resolved: watch_queue: fix pipe accounting mismatch Currently, watch_queue_set_size() modifies the pipe buffers charged to user->pipe_bufs without updating the pipe->nr_accounted on the pipe itself, due to the if (!pipe_has_watch_queue()) test in pipe_resize_ring(). This means that when the pipe is ultimately freed, we decrement user->pipe_bufs by something other than what than we had charged to it, potentially leading to an underflow. This in turn can cause subsequent too_many_pipe_buffers_soft() tests to fail with -EPERM. To remedy this, explicitly account for the pipe usage in watch_queue_set_size() to match the number set via account_pipe_buffers() (It's unclear why watch_queue_set_size() does not update nr_accounted; it may be due to intentional overprovisioning in watch_queue_set_size()?)


Published

2025-04-16T15:16:08.163

Last Modified

2025-11-04T17:00:09.103

Status

Analyzed

Source

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Severity

CVSSv3.1: 5.5 (MEDIUM)

Weaknesses
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 5.10.236 Yes
Operating System linux linux_kernel < 5.15.180 Yes
Operating System linux linux_kernel < 6.1.134 Yes
Operating System linux linux_kernel < 6.6.87 Yes
Operating System linux linux_kernel < 6.12.23 Yes
Operating System linux linux_kernel < 6.13.11 Yes
Operating System linux linux_kernel < 6.14.2 Yes
Operating System debian debian_linux 11.0 Yes

References