In the Linux kernel, the following vulnerability has been resolved:
watch_queue: fix pipe accounting mismatch
Currently, watch_queue_set_size() modifies the pipe buffers charged to
user->pipe_bufs without updating the pipe->nr_accounted on the pipe
itself, due to the if (!pipe_has_watch_queue()) test in
pipe_resize_ring(). This means that when the pipe is ultimately freed,
we decrement user->pipe_bufs by something other than what than we had
charged to it, potentially leading to an underflow. This in turn can
cause subsequent too_many_pipe_buffers_soft() tests to fail with -EPERM.
To remedy this, explicitly account for the pipe usage in
watch_queue_set_size() to match the number set via account_pipe_buffers()
(It's unclear why watch_queue_set_size() does not update nr_accounted;
it may be due to intentional overprovisioning in watch_queue_set_size()?)
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
04 Nov 2025, 17:00
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/205028ebba838938d3b264dda1d0708fa7fe1ade - Patch | |
| References | () https://git.kernel.org/stable/c/2d680b988656bb556c863d8b46d9b9096842bf3d - Patch | |
| References | () https://git.kernel.org/stable/c/471c89b7d4f58bd6082f7c1fe14d4ca15c7f1284 - Patch | |
| References | () https://git.kernel.org/stable/c/56ec918e6c86c1536870e4373e91eddd0c44245f - Patch | |
| References | () https://git.kernel.org/stable/c/6dafa27764183738dc5368b669b71e3d0d154f12 - Patch | |
| References | () https://git.kernel.org/stable/c/8658c75343ed00e5e154ebbe24335f51ba8db547 - Patch | |
| References | () https://git.kernel.org/stable/c/d40e3537265dea9e3c33021874437ff26dc18787 - Patch | |
| References | () https://git.kernel.org/stable/c/f13abc1e8e1a3b7455511c4e122750127f6bc9b0 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List | |
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| First Time |
Linux linux Kernel
Debian debian Linux Linux Debian |
03 Nov 2025, 20:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
16 Apr 2025, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-04-16 15:16
Updated : 2025-11-04 17:00
NVD link : CVE-2025-23138
Mitre link : CVE-2025-23138
CVE.ORG link : CVE-2025-23138
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
