{"id":"CVE-2023-54268","summary":"debugobjects: Don't wake up kswapd from fill_pool()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndebugobjects: Don't wake up kswapd from fill_pool()\n\nsyzbot is reporting a lockdep warning in fill_pool() because the allocation\nfrom debugobjects is using GFP_ATOMIC, which is (__GFP_HIGH | __GFP_KSWAPD_RECLAIM)\nand therefore tries to wake up kswapd, which acquires kswapd_wait::lock.\n\nSince fill_pool() might be called with arbitrary locks held, fill_pool()\nshould not assume that acquiring kswapd_wait::lock is safe.\n\nUse __GFP_HIGH instead and remove __GFP_NORETRY as it is pointless for\n!__GFP_DIRECT_RECLAIM allocation.","modified":"2026-04-02T09:45:44.001624Z","published":"2025-12-30T12:15:59.598Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54268.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/4c088d30a72d9b8f9c6ae9362222942e4075cb00"},{"type":"WEB","url":"https://git.kernel.org/stable/c/aee97eec77029270866c704f66cdf2881cbd2fe1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/be646802b3dc408c4dc72a3ac32c3f4a0282414d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d7fff52c99d52f180d8bef95d8ed8fec6343889c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/eb799279fb1f9c63c520fe8c1c41cb9154252db6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fd673079749bac97bb30f1461df079e6c8e86511"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54268.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54268"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3ac7fe5a4aab409bd5674d0b070bce97f9d20872"},{"fixed":"be646802b3dc408c4dc72a3ac32c3f4a0282414d"},{"fixed":"fd673079749bac97bb30f1461df079e6c8e86511"},{"fixed":"aee97eec77029270866c704f66cdf2881cbd2fe1"},{"fixed":"d7fff52c99d52f180d8bef95d8ed8fec6343889c"},{"fixed":"4c088d30a72d9b8f9c6ae9362222942e4075cb00"},{"fixed":"eb799279fb1f9c63c520fe8c1c41cb9154252db6"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54268.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.26"},{"fixed":"5.4.244"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.181"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.114"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.31"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.3.5"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54268.json"}}],"schema_version":"1.7.5"}