-

CVE-2023-53549

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ipset: Rework long task execution when adding/deleting entries

When adding/deleting large number of elements in one step in ipset, it can
take a reasonable amount of time and can result in soft lockup errors. The
patch 5f7b51bf09ba ("netfilter: ipset: Limit the maximal range of
consecutive elements to add/delete") tried to fix it by limiting the max
elements to process at all. However it was not enough, it is still possible
that we get hung tasks. Lowering the limit is not reasonable, so the
approach in this patch is as follows: rely on the method used at resizing
sets and save the state when we reach a smaller internal batch limit,
unlock/lock and proceed from the saved state. Thus we can avoid long
continuous tasks and at the same time removed the limit to add/delete large
number of elements in one step.

The nfnl mutex is held during the whole operation which prevents one to
issue other ipset commands in parallel.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < ee756980e491c829ba0495bb420b7224a9ee26b2
Version e62e62ea912a49f7230620f1bdc20410b943a44c
Status affected
Version < a1e1521b463968b4eca7163f61fb6cc54d008061
Version 5f7b51bf09baca8e4f80cbe879536842bafb5f31
Status affected
Version < 24a828f5a54bdeca0846526860d72b3766c5fe95
Version 5f7b51bf09baca8e4f80cbe879536842bafb5f31
Status affected
Version < 8964cc36ba011dc0e1041131fa2e91fb4c2a811b
Version 5f7b51bf09baca8e4f80cbe879536842bafb5f31
Status affected
Version < 5e29dc36bd5e2166b834ceb19990d9e68a734d7d
Version 5f7b51bf09baca8e4f80cbe879536842bafb5f31
Status affected
Version e0f824abe0f412f769fb5468b36c2471430bd885
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.14
Status affected
Version < 5.14
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.163
Status unaffected
Version <= 5.15.*
Version 5.15.87
Status unaffected
Version <= 6.0.*
Version 6.0.19
Status unaffected
Version <= 6.1.*
Version 6.1.5
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.034
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String