In the Linux kernel, the following vulnerability has been resolved:
net: sched: cls_u32: Undo tcf_bind_filter if u32_replace_hw_knode
When u32_replace_hw_knode fails, we need to undo the tcf_bind_filter
operation done at u32_set_parms.
net: sched: cls_u32: Undo tcf_bind_filter if u32_replace_hw_knode
When u32_replace_hw_knode fails, we need to undo the tcf_bind_filter
operation done at u32_set_parms.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 24 Oct 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: net: sched: cls_u32: Undo tcf_bind_filter if u32_replace_hw_knode When u32_replace_hw_knode fails, we need to undo the tcf_bind_filter operation done at u32_set_parms. | |
| Title | net: sched: cls_u32: Undo tcf_bind_filter if u32_replace_hw_knode | |
| References |
|
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-10-24T11:44:28.115Z
Reserved: 2025-10-22T13:21:37.350Z
Link: CVE-2023-53733
No data.
Status : Received
Published: 2025-10-24T12:15:35.617
Modified: 2025-10-24T12:15:35.617
Link: CVE-2023-53733
No data.
OpenCVE Enrichment
No data.