CVE-2023-53549

In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Rework long task execution when adding/deleting entries When adding/deleting large number of elements in one step in ipset, it can take a reasonable amount of time and can result in soft lockup errors. The patch 5f7b51bf09ba ("netfilter: ipset: Limit the maximal range of consecutive elements to add/delete") tried to fix it by limiting the max elements to process at all. However it was not enough, it is still possible that we get hung tasks. Lowering the limit is not reasonable, so the approach in this patch is as follows: rely on the method used at resizing sets and save the state when we reach a smaller internal batch limit, unlock/lock and proceed from the saved state. Thus we can avoid long continuous tasks and at the same time removed the limit to add/delete large number of elements in one step. The nfnl mutex is held during the whole operation which prevents one to issue other ipset commands in parallel.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*

History

10 Feb 2026, 22:27

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/24a828f5a54bdeca0846526860d72b3766c5fe95 - () https://git.kernel.org/stable/c/24a828f5a54bdeca0846526860d72b3766c5fe95 - Patch
References () https://git.kernel.org/stable/c/5e29dc36bd5e2166b834ceb19990d9e68a734d7d - () https://git.kernel.org/stable/c/5e29dc36bd5e2166b834ceb19990d9e68a734d7d - Patch
References () https://git.kernel.org/stable/c/8964cc36ba011dc0e1041131fa2e91fb4c2a811b - () https://git.kernel.org/stable/c/8964cc36ba011dc0e1041131fa2e91fb4c2a811b - Patch
References () https://git.kernel.org/stable/c/a1e1521b463968b4eca7163f61fb6cc54d008061 - () https://git.kernel.org/stable/c/a1e1521b463968b4eca7163f61fb6cc54d008061 - Patch
References () https://git.kernel.org/stable/c/ee756980e491c829ba0495bb420b7224a9ee26b2 - () https://git.kernel.org/stable/c/ee756980e491c829ba0495bb420b7224a9ee26b2 - Patch
CWE CWE-667
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*
First Time Linux
Linux linux Kernel

04 Oct 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-04 16:15

Updated : 2026-02-10 22:27


NVD link : CVE-2023-53549

Mitre link : CVE-2023-53549

CVE.ORG link : CVE-2023-53549


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking