CVE-2023-53733
BaseFortify
Publication date: 2025-10-24
Last updated on: 2025-10-27
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's network scheduler, specifically the cls_u32 module. When the function u32_replace_hw_knode fails, the system does not properly undo the tcf_bind_filter operation performed earlier in u32_set_parms, which can lead to inconsistent or incorrect filter states.
How can this vulnerability impact me? :
The impact of this vulnerability could include improper handling of network traffic filters, potentially causing network misbehavior or instability in the Linux kernel's traffic control subsystem. This might affect network performance or security filtering.