A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.
References
Link | Resource |
---|---|
https://github.com/torvalds/linux/commit/189b0ddc245139af81198d1a3637cac74f96e13a | Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20230214-0005/ | Third Party Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-22-1165/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-08-25 18:15
Updated : 2023-05-26 19:42
NVD link : CVE-2022-2959
Mitre link : CVE-2022-2959
CVE.ORG link : CVE-2022-2959
JSON object : View
Products Affected
linux
- linux_kernel