A flaw was found in the "Routing decision" classifier in the Linux kernel's Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
[
{
"events": [
{
"introduced": "3.18"
},
{
"fixed": "4.4.218"
}
]
},
{
"events": [
{
"introduced": "4.5"
},
{
"fixed": "4.9.218"
}
]
},
{
"events": [
{
"introduced": "4.10"
},
{
"fixed": "4.14.175"
}
]
},
{
"events": [
{
"introduced": "4.15"
},
{
"fixed": "4.19.114"
}
]
},
{
"events": [
{
"introduced": "4.20"
},
{
"fixed": "5.4.29"
}
]
},
{
"events": [
{
"introduced": "5.5.0"
},
{
"fixed": "5.5.14"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-3715.json"