{"id":"CVE-2023-53549","summary":"netfilter: ipset: Rework long task execution when adding/deleting entries","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ipset: Rework long task execution when adding/deleting entries\n\nWhen adding/deleting large number of elements in one step in ipset, it can\ntake a reasonable amount of time and can result in soft lockup errors. The\npatch 5f7b51bf09ba (\"netfilter: ipset: Limit the maximal range of\nconsecutive elements to add/delete\") tried to fix it by limiting the max\nelements to process at all. However it was not enough, it is still possible\nthat we get hung tasks. Lowering the limit is not reasonable, so the\napproach in this patch is as follows: rely on the method used at resizing\nsets and save the state when we reach a smaller internal batch limit,\nunlock/lock and proceed from the saved state. Thus we can avoid long\ncontinuous tasks and at the same time removed the limit to add/delete large\nnumber of elements in one step.\n\nThe nfnl mutex is held during the whole operation which prevents one to\nissue other ipset commands in parallel.","modified":"2026-03-20T12:33:13.359832Z","published":"2025-10-04T15:16:56.382Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53549.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/24a828f5a54bdeca0846526860d72b3766c5fe95"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5e29dc36bd5e2166b834ceb19990d9e68a734d7d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8964cc36ba011dc0e1041131fa2e91fb4c2a811b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a1e1521b463968b4eca7163f61fb6cc54d008061"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ee756980e491c829ba0495bb420b7224a9ee26b2"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53549.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53549"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e62e62ea912a49f7230620f1bdc20410b943a44c"},{"fixed":"ee756980e491c829ba0495bb420b7224a9ee26b2"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"5f7b51bf09baca8e4f80cbe879536842bafb5f31"},{"fixed":"a1e1521b463968b4eca7163f61fb6cc54d008061"},{"fixed":"24a828f5a54bdeca0846526860d72b3766c5fe95"},{"fixed":"8964cc36ba011dc0e1041131fa2e91fb4c2a811b"},{"fixed":"5e29dc36bd5e2166b834ceb19990d9e68a734d7d"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"e0f824abe0f412f769fb5468b36c2471430bd885"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53549.json"}}],"schema_version":"1.7.5"}