{"id":"CVE-2023-52932","summary":"mm/swapfile: add cond_resched() in get_swap_pages()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmm/swapfile: add cond_resched() in get_swap_pages()\n\nThe softlockup still occurs in get_swap_pages() under memory pressure.  64\nCPU cores, 64GB memory, and 28 zram devices, the disksize of each zram\ndevice is 50MB with same priority as si.  Use the stress-ng tool to\nincrease memory pressure, causing the system to oom frequently.\n\nThe plist_for_each_entry_safe() loops in get_swap_pages() could reach tens\nof thousands of times to find available space (extreme case:\ncond_resched() is not called in scan_swap_map_slots()).  Let's add\ncond_resched() into get_swap_pages() when failed to find available space\nto avoid softlockup.","modified":"2026-04-11T12:46:38.547242Z","published":"2025-03-27T16:37:13.594Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52932.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/29f0349c5c76b627fe06b87d4b13fa03a6ce8e64"},{"type":"WEB","url":"https://git.kernel.org/stable/c/30187be29052bba9203b0ae2bdd815e0bc2faaab"},{"type":"WEB","url":"https://git.kernel.org/stable/c/387217b97e99699c34e6d95ce2b91b327fcd853e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/49178d4d61e78aed8c837dfeea8a450700f196e2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5dbe1ebd56470d03b78fc31491a9e4d433106ef2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7717fc1a12f88701573f9ed897cc4f6699c661e3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d49c85a1913385eed46dd16a25ad0928253767f0"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52932.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52932"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"adfab836f4908deb049a5128082719e689eed964"},{"fixed":"29f0349c5c76b627fe06b87d4b13fa03a6ce8e64"},{"fixed":"387217b97e99699c34e6d95ce2b91b327fcd853e"},{"fixed":"d49c85a1913385eed46dd16a25ad0928253767f0"},{"fixed":"30187be29052bba9203b0ae2bdd815e0bc2faaab"},{"fixed":"5dbe1ebd56470d03b78fc31491a9e4d433106ef2"},{"fixed":"49178d4d61e78aed8c837dfeea8a450700f196e2"},{"fixed":"7717fc1a12f88701573f9ed897cc4f6699c661e3"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"75b1f2d3ed3169675b69b2f68217ebb839414657"},{"last_affected":"bcbfe6fdf8576a545fafdfe4611f59cc6b166589"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52932.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.16.0"},{"fixed":"4.14.306"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.15.0"},{"fixed":"4.19.273"}]},{"type":"ECOSYSTEM","events":[{"introduced":"4.20.0"},{"fixed":"5.4.232"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.168"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.93"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.11"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52932.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}