-
CVE-2023-54268
- EPSS 0.05%
- Veröffentlicht 30.12.2025 12:15:59
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
debugobjects: Don't wake up kswapd from fill_pool()
In the Linux kernel, the following vulnerability has been resolved: debugobjects: Don't wake up kswapd from fill_pool() syzbot is reporting a lockdep warning in fill_pool() because the allocation from debugobjects is using GFP_ATOMIC, which is (__GFP_HIGH | __GFP_KSWAPD_RECLAIM) and therefore tries to wake up kswapd, which acquires kswapd_wait::lock. Since fill_pool() might be called with arbitrary locks held, fill_pool() should not assume that acquiring kswapd_wait::lock is safe. Use __GFP_HIGH instead and remove __GFP_NORETRY as it is pointless for !__GFP_DIRECT_RECLAIM allocation.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
3ac7fe5a4aab409bd5674d0b070bce97f9d20872
Version <
be646802b3dc408c4dc72a3ac32c3f4a0282414d
Status
affected
Version
3ac7fe5a4aab409bd5674d0b070bce97f9d20872
Version <
fd673079749bac97bb30f1461df079e6c8e86511
Status
affected
Version
3ac7fe5a4aab409bd5674d0b070bce97f9d20872
Version <
aee97eec77029270866c704f66cdf2881cbd2fe1
Status
affected
Version
3ac7fe5a4aab409bd5674d0b070bce97f9d20872
Version <
d7fff52c99d52f180d8bef95d8ed8fec6343889c
Status
affected
Version
3ac7fe5a4aab409bd5674d0b070bce97f9d20872
Version <
4c088d30a72d9b8f9c6ae9362222942e4075cb00
Status
affected
Version
3ac7fe5a4aab409bd5674d0b070bce97f9d20872
Version <
eb799279fb1f9c63c520fe8c1c41cb9154252db6
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.26
Status
affected
Version
0
Version <
2.6.26
Status
unaffected
Version <=
5.4.*
Version
5.4.244
Status
unaffected
Version <=
5.10.*
Version
5.10.181
Status
unaffected
Version <=
5.15.*
Version
5.15.114
Status
unaffected
Version <=
6.1.*
Version
6.1.31
Status
unaffected
Version <=
6.3.*
Version
6.3.5
Status
unaffected
Version <=
*
Version
6.4
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.144 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|