Description
In the Linux kernel, the following vulnerability has been resolved: net: sched: cls_u32: Undo tcf_bind_filter if u32_replace_hw_knode When u32_replace_hw_knode fails, we need to undo the tcf_bind_filter operation done at u32_set_parms.
Product status
d34e3e181395192d6d1f50dd97bd7854e04e33a4 (git) before a9345793469b65ee5ba7b033239916c2a67d3dd4
d34e3e181395192d6d1f50dd97bd7854e04e33a4 (git) before 025159ed118ba5145b241d574edadb0e00d3c20f
d34e3e181395192d6d1f50dd97bd7854e04e33a4 (git) before 9cb36faedeafb9720ac236aeae2ea57091d90a09
4.7
Any version before 4.7
6.1.42 (semver)
6.4.7 (semver)
6.5 (original_commit_for_fix)
References
git.kernel.org/...c/a9345793469b65ee5ba7b033239916c2a67d3dd4
git.kernel.org/...c/025159ed118ba5145b241d574edadb0e00d3c20f
git.kernel.org/...c/9cb36faedeafb9720ac236aeae2ea57091d90a09