oss-sec mailing list archives

Re: FWD: Kernel vulnerabilities CVE-2021-33630 & CVE-2021-33631


From: Thadeu Lima de Souza Cascardo <cascardo () canonical com>
Date: Wed, 31 Jan 2024 08:25:42 -0300

On Tue, Jan 30, 2024 at 03:25:24PM +0100, Solar Designer wrote:
Hi,
[...]
https://nvd.nist.gov/vuln/detail/CVE-2021-33630

This says:

"NULL Pointer Dereference vulnerability in openEuler kernel on Linux
(network modules) allows Pointer Manipulation. This vulnerability is
associated with program files net/sched/sch_cbs.C. This issue affects
openEuler kernel: from 4.19.90 before 4.19.90-2401.3."

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e8b9bfa110896f95d602d8c98d5f9d67e41d78c

This mainline commit is from 2019, "net/sched: cbs: Fix not adding cbs
instance to list".

[...]
The above links don't say anything about attack vectors and required
access - I guess CAP_NET_ADMIN [...]
[...]
 
Alexander

I always find it lacking when CAP_NET_ADMIN is mentioned but without specifying
if it is the capability in the initial user namespace or any user namespace.

That is relevant for Ubuntu since it allows unprivileged creation of user
namespaces by default making it a PR:L instead of a PR:H attack, using CVSS
parlance.

I suppose it is relevant for other distros and systems as well, so worth noting
that this is important information.

Cascardo.


Current thread: