We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2021-33630

NULL-ptr-deref in network sched



Description

NULL Pointer Dereference vulnerability in openEuler kernel on Linux (network modules) allows Pointer Manipulation. This vulnerability is associated with program files net/sched/sch_cbs.C. This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3.

Reserved 2021-05-28 | Published 2024-01-18 | Updated 2025-05-07 | Assigner openEuler


MEDIUM: 5.5CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-476 NULL Pointer Dereference

Product status

Default status
unaffected

4.19.90 before 4.19.90-2401.3
affected

References

www.openeuler.org/...etins/detail/?id=openEuler-SA-2024-1030

www.openeuler.org/...etins/detail/?id=openEuler-SA-2024-1031

gitee.com/src-openeuler/kernel/pulls/1389

git.kernel.org/...d=3e8b9bfa110896f95d602d8c98d5f9d67e41d78c

www.openwall.com/lists/oss-security/2024/01/30/3

www.openwall.com/lists/oss-security/2024/01/30/4

www.openwall.com/lists/oss-security/2024/01/30/5

www.openwall.com/lists/oss-security/2024/01/30/9

www.openwall.com/lists/oss-security/2024/01/30/10

www.openwall.com/lists/oss-security/2024/01/31/3

www.openwall.com/lists/oss-security/2024/01/31/2

www.openwall.com/lists/oss-security/2024/02/02/6

www.openwall.com/lists/oss-security/2024/02/02/9

www.openwall.com/lists/oss-security/2024/02/03/1

lists.debian.org/debian-lts-announce/2024/06/msg00020.html

cve.org (CVE-2021-33630)

nvd.nist.gov (CVE-2021-33630)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2021-33630

Support options

Helpdesk Chat, Email, Knowledgebase