CVE-2021-33630: CWE-476 NULL Pointer Dereference in openEuler kernel
NULL Pointer Dereference vulnerability in openEuler kernel on Linux (network modules) allows Pointer Manipulation. This vulnerability is associated with program files net/sched/sch_cbs.C. This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3.
AI Analysis
Technical Summary
CVE-2021-33630 is a medium-severity vulnerability identified in the openEuler Linux kernel, specifically affecting the network scheduling component implemented in the source file net/sched/sch_cbs.C. The vulnerability is classified as a NULL Pointer Dereference (CWE-476), which occurs when the kernel attempts to dereference a pointer that has not been properly initialized or has been set to NULL. This flaw exists in openEuler kernel versions starting from 4.19.90 up to but not including 4.19.90-2401.3. The vulnerability allows for pointer manipulation within the kernel's network modules, potentially leading to a denial of service (DoS) condition by causing the kernel to crash or become unresponsive. The CVSS v3.1 base score is 5.5, indicating a medium severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity impact. There are no known exploits in the wild as of the publication date, and no official patches have been linked in the provided information. This vulnerability is relevant to systems running the openEuler kernel, which is a Linux distribution primarily developed and maintained by Huawei and the openEuler community, targeting enterprise and cloud environments. The issue arises from improper handling of pointers in the network scheduler code, which could be triggered by a local user or process with limited privileges, potentially causing a kernel panic or system crash, thus disrupting network services and overall system availability.
Potential Impact
For European organizations using openEuler in their infrastructure, particularly in enterprise servers, cloud platforms, or network appliances, this vulnerability poses a risk of service disruption due to kernel crashes. Although it does not compromise data confidentiality or integrity, the denial of service impact can affect critical network operations, leading to downtime and potential financial losses. Organizations relying on openEuler for network-intensive workloads or telecommunications infrastructure could experience degraded service quality or outages. The requirement for local access and low privileges means that insider threats or compromised low-privilege accounts could exploit this vulnerability. Given the increasing adoption of openEuler in cloud and edge computing environments, especially in sectors like telecommunications, finance, and government, the availability impact could have cascading effects on dependent services and customers. The absence of known exploits reduces immediate risk, but the medium severity and potential for disruption warrant prompt attention.
Mitigation Recommendations
European organizations should prioritize upgrading the openEuler kernel to versions later than 4.19.90-2401.3 where this vulnerability is addressed. In the absence of an official patch, organizations can mitigate risk by restricting local access to trusted users only and implementing strict privilege separation to minimize the number of accounts with local kernel-level access. Monitoring system logs for kernel panics or unusual network scheduler behavior can provide early detection of exploitation attempts. Employing kernel hardening techniques such as SELinux or AppArmor policies to limit network module interactions may reduce exploitation likelihood. Additionally, organizations should conduct regular vulnerability assessments and penetration testing focused on kernel-level vulnerabilities. For critical systems, consider isolating openEuler hosts from untrusted networks and enforcing multi-factor authentication for all local access. Maintaining up-to-date backups and incident response plans will help minimize downtime if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2021-33630: CWE-476 NULL Pointer Dereference in openEuler kernel
Description
NULL Pointer Dereference vulnerability in openEuler kernel on Linux (network modules) allows Pointer Manipulation. This vulnerability is associated with program files net/sched/sch_cbs.C. This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3.
AI-Powered Analysis
Technical Analysis
CVE-2021-33630 is a medium-severity vulnerability identified in the openEuler Linux kernel, specifically affecting the network scheduling component implemented in the source file net/sched/sch_cbs.C. The vulnerability is classified as a NULL Pointer Dereference (CWE-476), which occurs when the kernel attempts to dereference a pointer that has not been properly initialized or has been set to NULL. This flaw exists in openEuler kernel versions starting from 4.19.90 up to but not including 4.19.90-2401.3. The vulnerability allows for pointer manipulation within the kernel's network modules, potentially leading to a denial of service (DoS) condition by causing the kernel to crash or become unresponsive. The CVSS v3.1 base score is 5.5, indicating a medium severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity impact. There are no known exploits in the wild as of the publication date, and no official patches have been linked in the provided information. This vulnerability is relevant to systems running the openEuler kernel, which is a Linux distribution primarily developed and maintained by Huawei and the openEuler community, targeting enterprise and cloud environments. The issue arises from improper handling of pointers in the network scheduler code, which could be triggered by a local user or process with limited privileges, potentially causing a kernel panic or system crash, thus disrupting network services and overall system availability.
Potential Impact
For European organizations using openEuler in their infrastructure, particularly in enterprise servers, cloud platforms, or network appliances, this vulnerability poses a risk of service disruption due to kernel crashes. Although it does not compromise data confidentiality or integrity, the denial of service impact can affect critical network operations, leading to downtime and potential financial losses. Organizations relying on openEuler for network-intensive workloads or telecommunications infrastructure could experience degraded service quality or outages. The requirement for local access and low privileges means that insider threats or compromised low-privilege accounts could exploit this vulnerability. Given the increasing adoption of openEuler in cloud and edge computing environments, especially in sectors like telecommunications, finance, and government, the availability impact could have cascading effects on dependent services and customers. The absence of known exploits reduces immediate risk, but the medium severity and potential for disruption warrant prompt attention.
Mitigation Recommendations
European organizations should prioritize upgrading the openEuler kernel to versions later than 4.19.90-2401.3 where this vulnerability is addressed. In the absence of an official patch, organizations can mitigate risk by restricting local access to trusted users only and implementing strict privilege separation to minimize the number of accounts with local kernel-level access. Monitoring system logs for kernel panics or unusual network scheduler behavior can provide early detection of exploitation attempts. Employing kernel hardening techniques such as SELinux or AppArmor policies to limit network module interactions may reduce exploitation likelihood. Additionally, organizations should conduct regular vulnerability assessments and penetration testing focused on kernel-level vulnerabilities. For critical systems, consider isolating openEuler hosts from untrusted networks and enforcing multi-factor authentication for all local access. Maintaining up-to-date backups and incident response plans will help minimize downtime if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- openEuler
- Date Reserved
- 2021-05-28T14:26:05.940Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd8ce3
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 7/5/2025, 9:25:25 AM
Last updated: 8/18/2025, 4:37:13 AM
Views: 14
Related Threats
CVE-2025-9107: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9106: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9105: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9104: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9102: Improper Export of Android Application Components in 1&1 Mail & Media mail.com App
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.