A flaw was found under netfilter subsystem. Race between IPSET_CMD_ADD and IPSET_CMD_SWAP. No lock is hold when it does the `cond_resched()`. As a result, `ip_set_ref_lock` (in thread 2) can swap the set with another when thread 1 is doing the `cond_resched()`. Which might lead to a local Denial of Service (DoS).
Reference: https://seclists.org/oss-sec/2023/q3/242 Upstream fix: https://github.com/torvalds/linux/commit/7433b6d2afd512d04398c73aa984d1e285be125b
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2241163]
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2394