CVE-2023-53733
Description
In the Linux kernel, the following vulnerability has been resolved:
net: sched: cls_u32: Undo tcf_bind_filter if u32_replace_hw_knode
When u32_replace_hw_knode fails, we need to undo the tcf_bind_filter operation done at u32_set_parms.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's cls_u32 classifier, a failure in u32_replace_hw_knode leaves a stale tcf_bind_filter reference, causing a use-after-free.
Vulnerability
In the Linux kernel's net/sched/cls_u32 classifier, when the function u32_replace_hw_knode fails, the code does not undo the tcf_bind_filter operation that was performed earlier in u32_set_parms. This leaves a stale reference to a filter that may have been freed, leading to a use-after-free vulnerability [1].
Exploitation
An attacker with the ability to add or modify cls_u32 filters (typically requiring CAP_NET_ADMIN) can trigger this bug by causing u32_replace_hw_knode to fail. This can be done, for example, by exhausting hardware offload resources or by providing invalid parameters that cause the hardware offload function to return an error. The failure path then skips the unbind, leaving a dangling pointer [2].
Impact
A local attacker with sufficient privileges can exploit this to cause a use-after-free, potentially leading to a kernel crash (denial of service) or, in some cases, arbitrary code execution in the kernel context. The vulnerability affects systems that use the cls_u32 classifier with hardware offload enabled [3].
Mitigation
The fix has been applied in the Linux kernel stable trees. Users should update to a kernel version containing the commit that adds the missing tcf_unbind_filter call in the error path of u32_replace_hw_knode. No workaround is available other than disabling hardware offload for cls_u32 or restricting access to the netlink socket.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
3a9345793469b025159ed118b9cb36faedeafVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.