HomeDefault status
unaffected
d34e3e181395192d6d1f50dd97bd7854e04e33a4 (git) before a9345793469b65ee5ba7b033239916c2a67d3dd4
affected
d34e3e181395192d6d1f50dd97bd7854e04e33a4 (git) before 025159ed118ba5145b241d574edadb0e00d3c20f
affected
d34e3e181395192d6d1f50dd97bd7854e04e33a4 (git) before 9cb36faedeafb9720ac236aeae2ea57091d90a09
affected
Default status
affected
4.7
affected
Any version before 4.7
unaffected
6.1.42 (semver)
unaffected
6.4.7 (semver)
unaffected
6.5 (original_commit_for_fix)
unaffected
Description
In the Linux kernel, the following vulnerability has been resolved: net: sched: cls_u32: Undo tcf_bind_filter if u32_replace_hw_knode When u32_replace_hw_knode fails, we need to undo the tcf_bind_filter operation done at u32_set_parms.
Product status
d34e3e181395192d6d1f50dd97bd7854e04e33a4 (git) before a9345793469b65ee5ba7b033239916c2a67d3dd4
d34e3e181395192d6d1f50dd97bd7854e04e33a4 (git) before 025159ed118ba5145b241d574edadb0e00d3c20f
d34e3e181395192d6d1f50dd97bd7854e04e33a4 (git) before 9cb36faedeafb9720ac236aeae2ea57091d90a09
4.7
Any version before 4.7
6.1.42 (semver)
6.4.7 (semver)
6.5 (original_commit_for_fix)
References
git.kernel.org/...c/a9345793469b65ee5ba7b033239916c2a67d3dd4
git.kernel.org/...c/025159ed118ba5145b241d574edadb0e00d3c20f
git.kernel.org/...c/9cb36faedeafb9720ac236aeae2ea57091d90a09
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.