Home

Description

In the Linux kernel, the following vulnerability has been resolved: net: sched: cls_u32: Undo tcf_bind_filter if u32_replace_hw_knode When u32_replace_hw_knode fails, we need to undo the tcf_bind_filter operation done at u32_set_parms.

PUBLISHED Reserved 2025-10-22 | Published 2025-10-24 | Updated 2025-10-24 | Assigner Linux

Product status

Default status
unaffected

d34e3e181395192d6d1f50dd97bd7854e04e33a4 (git) before a9345793469b65ee5ba7b033239916c2a67d3dd4
affected

d34e3e181395192d6d1f50dd97bd7854e04e33a4 (git) before 025159ed118ba5145b241d574edadb0e00d3c20f
affected

d34e3e181395192d6d1f50dd97bd7854e04e33a4 (git) before 9cb36faedeafb9720ac236aeae2ea57091d90a09
affected

Default status
affected

4.7
affected

Any version before 4.7
unaffected

6.1.42 (semver)
unaffected

6.4.7 (semver)
unaffected

6.5 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/a9345793469b65ee5ba7b033239916c2a67d3dd4

git.kernel.org/...c/025159ed118ba5145b241d574edadb0e00d3c20f

git.kernel.org/...c/9cb36faedeafb9720ac236aeae2ea57091d90a09

cve.org (CVE-2023-53733)

nvd.nist.gov (CVE-2023-53733)

Download JSON