CVE-2023-54268 — Deadlock in Linux
Severity
2.5LOW
No vectorEPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 30
Description
In the Linux kernel, the following vulnerability has been resolved:
debugobjects: Don't wake up kswapd from fill_pool()
syzbot is reporting a lockdep warning in fill_pool() because the allocation
from debugobjects is using GFP_ATOMIC, which is (__GFP_HIGH | __GFP_KSWAPD_RECLAIM)
and therefore tries to wake up kswapd, which acquires kswapd_wait::lock.
Since fill_pool() might be called with arbitrary locks held, fill_pool()
should not assume that acquiring kswapd_wait::lock is safe.
Use __GFP_…
Affected Packages4 packages
▶CVEListV5linux/linux3ac7fe5a4aab409bd5674d0b070bce97f9d20872 — be646802b3dc408c4dc72a3ac32c3f4a0282414d+6
🔴Vulnerability Details
3OSV▶
CVE-2023-54268: In the Linux kernel, the following vulnerability has been resolved: debugobjects: Don't wake up kswapd from fill_pool() syzbot is reporting a lockdep↗2025-12-30
GHSA▶
GHSA-wfjg-crvw-f25h: In the Linux kernel, the following vulnerability has been resolved:
debugobjects: Don't wake up kswapd from fill_pool()
syzbot is reporting a lockde↗2025-12-30