We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-52932

mm/swapfile: add cond_resched() in get_swap_pages()



Description

In the Linux kernel, the following vulnerability has been resolved: mm/swapfile: add cond_resched() in get_swap_pages() The softlockup still occurs in get_swap_pages() under memory pressure. 64 CPU cores, 64GB memory, and 28 zram devices, the disksize of each zram device is 50MB with same priority as si. Use the stress-ng tool to increase memory pressure, causing the system to oom frequently. The plist_for_each_entry_safe() loops in get_swap_pages() could reach tens of thousands of times to find available space (extreme case: cond_resched() is not called in scan_swap_map_slots()). Let's add cond_resched() into get_swap_pages() when failed to find available space to avoid softlockup.

Reserved 2024-08-21 | Published 2025-03-27 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 29f0349c5c76b627fe06b87d4b13fa03a6ce8e64
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 387217b97e99699c34e6d95ce2b91b327fcd853e
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before d49c85a1913385eed46dd16a25ad0928253767f0
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 30187be29052bba9203b0ae2bdd815e0bc2faaab
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 5dbe1ebd56470d03b78fc31491a9e4d433106ef2
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 49178d4d61e78aed8c837dfeea8a450700f196e2
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 7717fc1a12f88701573f9ed897cc4f6699c661e3
affected

Default status
affected

4.14.306
unaffected

4.19.273
unaffected

5.4.232
unaffected

5.10.168
unaffected

5.15.93
unaffected

6.1.11
unaffected

6.2
unaffected

References

git.kernel.org/...c/29f0349c5c76b627fe06b87d4b13fa03a6ce8e64

git.kernel.org/...c/387217b97e99699c34e6d95ce2b91b327fcd853e

git.kernel.org/...c/d49c85a1913385eed46dd16a25ad0928253767f0

git.kernel.org/...c/30187be29052bba9203b0ae2bdd815e0bc2faaab

git.kernel.org/...c/5dbe1ebd56470d03b78fc31491a9e4d433106ef2

git.kernel.org/...c/49178d4d61e78aed8c837dfeea8a450700f196e2

git.kernel.org/...c/7717fc1a12f88701573f9ed897cc4f6699c661e3

cve.org (CVE-2023-52932)

nvd.nist.gov (CVE-2023-52932)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-52932

Support options

Helpdesk Chat, Email, Knowledgebase