A flaw was found in the "Routing decision" classifier in the Linux kernel's Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
References
Link | Resource |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359 | Mailing List Patch Vendor Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359 | Mailing List Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359 - Mailing List, Patch, Vendor Advisory |
Information
Published : 2022-03-02 23:15
Updated : 2024-11-21 06:22
NVD link : CVE-2021-3715
Mitre link : CVE-2021-3715
CVE.ORG link : CVE-2021-3715
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free