A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.
The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-22-1165/ | vdb entry third party advisory |
https://github.com/torvalds/linux/commit/189b0ddc245139af81198d1a3637cac74f96e13a | third party advisory patch |
https://security.netapp.com/advisory/ntap-20230214-0005/ | third party advisory |