Skip to main content

CVE-2021-33630: CWE-476 NULL Pointer Dereference in openEuler kernel

Medium
VulnerabilityCVE-2021-33630cvecve-2021-33630cwe-476
Published: Thu Jan 18 2024 (01/18/2024, 15:00:49 UTC)
Source: CVE
Vendor/Project: openEuler
Product: kernel

Description

NULL Pointer Dereference vulnerability in openEuler kernel on Linux (network modules) allows Pointer Manipulation. This vulnerability is associated with program files net/sched/sch_cbs.C. This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3.

AI-Powered Analysis

AILast updated: 07/05/2025, 09:25:25 UTC

Technical Analysis

CVE-2021-33630 is a medium-severity vulnerability identified in the openEuler Linux kernel, specifically affecting the network scheduling component implemented in the source file net/sched/sch_cbs.C. The vulnerability is classified as a NULL Pointer Dereference (CWE-476), which occurs when the kernel attempts to dereference a pointer that has not been properly initialized or has been set to NULL. This flaw exists in openEuler kernel versions starting from 4.19.90 up to but not including 4.19.90-2401.3. The vulnerability allows for pointer manipulation within the kernel's network modules, potentially leading to a denial of service (DoS) condition by causing the kernel to crash or become unresponsive. The CVSS v3.1 base score is 5.5, indicating a medium severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity impact. There are no known exploits in the wild as of the publication date, and no official patches have been linked in the provided information. This vulnerability is relevant to systems running the openEuler kernel, which is a Linux distribution primarily developed and maintained by Huawei and the openEuler community, targeting enterprise and cloud environments. The issue arises from improper handling of pointers in the network scheduler code, which could be triggered by a local user or process with limited privileges, potentially causing a kernel panic or system crash, thus disrupting network services and overall system availability.

Potential Impact

For European organizations using openEuler in their infrastructure, particularly in enterprise servers, cloud platforms, or network appliances, this vulnerability poses a risk of service disruption due to kernel crashes. Although it does not compromise data confidentiality or integrity, the denial of service impact can affect critical network operations, leading to downtime and potential financial losses. Organizations relying on openEuler for network-intensive workloads or telecommunications infrastructure could experience degraded service quality or outages. The requirement for local access and low privileges means that insider threats or compromised low-privilege accounts could exploit this vulnerability. Given the increasing adoption of openEuler in cloud and edge computing environments, especially in sectors like telecommunications, finance, and government, the availability impact could have cascading effects on dependent services and customers. The absence of known exploits reduces immediate risk, but the medium severity and potential for disruption warrant prompt attention.

Mitigation Recommendations

European organizations should prioritize upgrading the openEuler kernel to versions later than 4.19.90-2401.3 where this vulnerability is addressed. In the absence of an official patch, organizations can mitigate risk by restricting local access to trusted users only and implementing strict privilege separation to minimize the number of accounts with local kernel-level access. Monitoring system logs for kernel panics or unusual network scheduler behavior can provide early detection of exploitation attempts. Employing kernel hardening techniques such as SELinux or AppArmor policies to limit network module interactions may reduce exploitation likelihood. Additionally, organizations should conduct regular vulnerability assessments and penetration testing focused on kernel-level vulnerabilities. For critical systems, consider isolating openEuler hosts from untrusted networks and enforcing multi-factor authentication for all local access. Maintaining up-to-date backups and incident response plans will help minimize downtime if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
openEuler
Date Reserved
2021-05-28T14:26:05.940Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8ce3

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 9:25:25 AM

Last updated: 8/18/2025, 4:37:13 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats