|
Message-ID: <ZbouNugSu+17l256@quatroqueijos.cascardo.eti.br> Date: Wed, 31 Jan 2024 08:25:42 -0300 From: Thadeu Lima de Souza Cascardo <cascardo@...onical.com> To: oss-security@...ts.openwall.com Cc: Armin Kuster <akuster@...sta.com> Subject: Re: FWD: Kernel vulnerabilities CVE-2021-33630 & CVE-2021-33631 On Tue, Jan 30, 2024 at 03:25:24PM +0100, Solar Designer wrote: > Hi, [...] > > https://nvd.nist.gov/vuln/detail/CVE-2021-33630 > > This says: > > "NULL Pointer Dereference vulnerability in openEuler kernel on Linux > (network modules) allows Pointer Manipulation. This vulnerability is > associated with program files net/sched/sch_cbs.C. This issue affects > openEuler kernel: from 4.19.90 before 4.19.90-2401.3." > > > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e8b9bfa110896f95d602d8c98d5f9d67e41d78c > > This mainline commit is from 2019, "net/sched: cbs: Fix not adding cbs > instance to list". > [...] > The above links don't say anything about attack vectors and required > access - I guess CAP_NET_ADMIN [...] [...] > Alexander I always find it lacking when CAP_NET_ADMIN is mentioned but without specifying if it is the capability in the initial user namespace or any user namespace. That is relevant for Ubuntu since it allows unprivileged creation of user namespaces by default making it a PR:L instead of a PR:H attack, using CVSS parlance. I suppose it is relevant for other distros and systems as well, so worth noting that this is important information. Cascardo.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.