-

CVE-2023-54268

In the Linux kernel, the following vulnerability has been resolved:

debugobjects: Don't wake up kswapd from fill_pool()

syzbot is reporting a lockdep warning in fill_pool() because the allocation
from debugobjects is using GFP_ATOMIC, which is (__GFP_HIGH | __GFP_KSWAPD_RECLAIM)
and therefore tries to wake up kswapd, which acquires kswapd_wait::lock.

Since fill_pool() might be called with arbitrary locks held, fill_pool()
should not assume that acquiring kswapd_wait::lock is safe.

Use __GFP_HIGH instead and remove __GFP_NORETRY as it is pointless for
!__GFP_DIRECT_RECLAIM allocation.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < be646802b3dc408c4dc72a3ac32c3f4a0282414d
Version 3ac7fe5a4aab409bd5674d0b070bce97f9d20872
Status affected
Version < fd673079749bac97bb30f1461df079e6c8e86511
Version 3ac7fe5a4aab409bd5674d0b070bce97f9d20872
Status affected
Version < aee97eec77029270866c704f66cdf2881cbd2fe1
Version 3ac7fe5a4aab409bd5674d0b070bce97f9d20872
Status affected
Version < d7fff52c99d52f180d8bef95d8ed8fec6343889c
Version 3ac7fe5a4aab409bd5674d0b070bce97f9d20872
Status affected
Version < 4c088d30a72d9b8f9c6ae9362222942e4075cb00
Version 3ac7fe5a4aab409bd5674d0b070bce97f9d20872
Status affected
Version < eb799279fb1f9c63c520fe8c1c41cb9154252db6
Version 3ac7fe5a4aab409bd5674d0b070bce97f9d20872
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.26
Status affected
Version < 2.6.26
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.244
Status unaffected
Version <= 5.10.*
Version 5.10.181
Status unaffected
Version <= 5.15.*
Version 5.15.114
Status unaffected
Version <= 6.1.*
Version 6.1.31
Status unaffected
Version <= 6.3.*
Version 6.3.5
Status unaffected
Version <= *
Version 6.4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.099
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.