First published: Thu Mar 27 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: mm/swapfile: add cond_resched() in get_swap_pages() The softlockup still occurs in get_swap_pages() under memory pressure. 64 CPU cores, 64GB memory, and 28 zram devices, the disksize of each zram device is 50MB with same priority as si. Use the stress-ng tool to increase memory pressure, causing the system to oom frequently. The plist_for_each_entry_safe() loops in get_swap_pages() could reach tens of thousands of times to find available space (extreme case: cond_resched() is not called in scan_swap_map_slots()). Let's add cond_resched() into get_swap_pages() when failed to find available space to avoid softlockup.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | <4.14.306 | |
Linux Kernel | >=4.15<4.19.273 | |
Linux Kernel | >=4.20<5.4.232 | |
Linux Kernel | >=5.5<5.10.168 | |
Linux Kernel | >=5.11<5.15.93 | |
Linux Kernel | >=5.16<6.1.11 | |
Linux Kernel | =6.2-rc1 | |
Linux Kernel | =6.2-rc2 | |
Linux Kernel | =6.2-rc3 | |
Linux Kernel | =6.2-rc4 | |
Linux Kernel | =6.2-rc5 | |
Linux Kernel | =6.2-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-52932 has a severity rating that indicates its potential impact on system performance under certain conditions.
To mitigate CVE-2023-52932, apply the patches provided in the updated versions of the Linux kernel.
CVE-2023-52932 affects multiple versions of the Linux kernel, particularly those before 6.2-rc1.
CVE-2023-52932 can lead to softlockup situations in the get_swap_pages function during high memory pressure.
Currently, the recommended approach for CVE-2023-52932 is to update to a patched version of the Linux kernel, as no specific workaround is provided.