CVE-2023-53549
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
04/10/2025
Última modificación:
06/10/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
netfilter: ipset: Rework long task execution when adding/deleting entries<br />
<br />
When adding/deleting large number of elements in one step in ipset, it can<br />
take a reasonable amount of time and can result in soft lockup errors. The<br />
patch 5f7b51bf09ba ("netfilter: ipset: Limit the maximal range of<br />
consecutive elements to add/delete") tried to fix it by limiting the max<br />
elements to process at all. However it was not enough, it is still possible<br />
that we get hung tasks. Lowering the limit is not reasonable, so the<br />
approach in this patch is as follows: rely on the method used at resizing<br />
sets and save the state when we reach a smaller internal batch limit,<br />
unlock/lock and proceed from the saved state. Thus we can avoid long<br />
continuous tasks and at the same time removed the limit to add/delete large<br />
number of elements in one step.<br />
<br />
The nfnl mutex is held during the whole operation which prevents one to<br />
issue other ipset commands in parallel.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/24a828f5a54bdeca0846526860d72b3766c5fe95
- https://git.kernel.org/stable/c/5e29dc36bd5e2166b834ceb19990d9e68a734d7d
- https://git.kernel.org/stable/c/8964cc36ba011dc0e1041131fa2e91fb4c2a811b
- https://git.kernel.org/stable/c/a1e1521b463968b4eca7163f61fb6cc54d008061
- https://git.kernel.org/stable/c/ee756980e491c829ba0495bb420b7224a9ee26b2



