-
CVE-2023-53549
- EPSS 0.02%
- Published 04.10.2025 15:16:56
- Last modified 06.10.2025 14:56:21
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Rework long task execution when adding/deleting entries When adding/deleting large number of elements in one step in ipset, it can take a reasonable amount of time and can result in soft lockup errors. The patch 5f7b51bf09ba ("netfilter: ipset: Limit the maximal range of consecutive elements to add/delete") tried to fix it by limiting the max elements to process at all. However it was not enough, it is still possible that we get hung tasks. Lowering the limit is not reasonable, so the approach in this patch is as follows: rely on the method used at resizing sets and save the state when we reach a smaller internal batch limit, unlock/lock and proceed from the saved state. Thus we can avoid long continuous tasks and at the same time removed the limit to add/delete large number of elements in one step. The nfnl mutex is held during the whole operation which prevents one to issue other ipset commands in parallel.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
ee756980e491c829ba0495bb420b7224a9ee26b2
Version
e62e62ea912a49f7230620f1bdc20410b943a44c
Status
affected
Version <
a1e1521b463968b4eca7163f61fb6cc54d008061
Version
5f7b51bf09baca8e4f80cbe879536842bafb5f31
Status
affected
Version <
24a828f5a54bdeca0846526860d72b3766c5fe95
Version
5f7b51bf09baca8e4f80cbe879536842bafb5f31
Status
affected
Version <
8964cc36ba011dc0e1041131fa2e91fb4c2a811b
Version
5f7b51bf09baca8e4f80cbe879536842bafb5f31
Status
affected
Version <
5e29dc36bd5e2166b834ceb19990d9e68a734d7d
Version
5f7b51bf09baca8e4f80cbe879536842bafb5f31
Status
affected
Version
e0f824abe0f412f769fb5468b36c2471430bd885
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
5.14
Status
affected
Version <
5.14
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.163
Status
unaffected
Version <=
5.15.*
Version
5.15.87
Status
unaffected
Version <=
6.0.*
Version
6.0.19
Status
unaffected
Version <=
6.1.*
Version
6.1.5
Status
unaffected
Version <=
*
Version
6.2
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.034 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|