CVE-2023-53549
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.14 |
| linux | linux_kernel | 5.14 |
| linux | linux_kernel | 6.2 |
| linux | linux_kernel | 6.2 |
| linux | linux_kernel | From 6.1 (inc) to 6.1.5 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.0.19 (exc) |
| linux | linux_kernel | From 5.13.14 (inc) to 5.14 (exc) |
| linux | linux_kernel | 5.14 |
| linux | linux_kernel | From 5.10.157 (inc) to 5.10.163 (exc) |
| linux | linux_kernel | From 5.14.1 (inc) to 5.15.87 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-667 | The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's netfilter ipset component when adding or deleting a large number of elements in one step. The operation can take a long time and cause soft lockup errors, meaning the system can become unresponsive temporarily. Previous attempts to fix this by limiting the number of elements processed at once were insufficient. The updated approach breaks the task into smaller batches, saving state between batches and unlocking/relocking as needed to avoid long continuous tasks and prevent system hangs.
How can this vulnerability impact me? :
The vulnerability can cause soft lockup errors during large ipset add/delete operations, which may lead to temporary system unresponsiveness or hung tasks. This can affect system stability and availability when managing large sets of network filtering rules.