A flaw was found in the "Routing decision" classifier in the Linux kernel's Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
References
Link | Resource |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359 | Mailing List Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-03-02 15:15
Updated : 2023-01-24 07:07
NVD link : CVE-2021-3715
Mitre link : CVE-2021-3715
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
linux
- linux_kernel