{"id":"CVE-2021-33630","details":"NULL Pointer Dereference vulnerability in openEuler kernel on Linux (network modules) allows Pointer Manipulation. This vulnerability is associated with program files net/sched/sch_cbs.C.\n\nThis issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3.","modified":"2026-03-13T04:55:55.456527Z","published":"2024-01-18T15:15:08.653Z","references":[{"type":"WEB","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e8b9bfa110896f95d602d8c98d5f9d67e41d78c"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/01/30/3"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/01/31/3"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/01/30/10"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/02/02/6"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/02/03/1"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/01/30/4"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/01/30/5"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/01/30/9"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/01/31/2"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/02/02/9"},{"type":"ADVISORY","url":"https://gitee.com/src-openeuler/kernel/pulls/1389"},{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030"},{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1031"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"4.19.90"},{"fixed":"4.19.90-2401.3"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-33630.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}