CVE-2023-53733

Source
https://cve.org/CVERecord?id=CVE-2023-53733
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53733.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53733
Downstream
Related
Published
2025-10-24T11:44:28.115Z
Modified
2026-03-20T12:33:19.333425Z
Summary
net: sched: cls_u32: Undo tcf_bind_filter if u32_replace_hw_knode
Details

In the Linux kernel, the following vulnerability has been resolved:

net: sched: clsu32: Undo tcfbindfilter if u32replacehwknode

When u32replacehwknode fails, we need to undo the tcfbindfilter operation done at u32set_parms.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53733.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d34e3e181395192d6d1f50dd97bd7854e04e33a4
Fixed
a9345793469b65ee5ba7b033239916c2a67d3dd4
Fixed
025159ed118ba5145b241d574edadb0e00d3c20f
Fixed
9cb36faedeafb9720ac236aeae2ea57091d90a09

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53733.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.7.0
Fixed
6.1.42
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53733.json"