CVE-2021-33033

The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:08

Type Values Removed Values Added
References () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.14 - Mailing List, Patch, Vendor Advisory () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.14 - Mailing List, Patch, Vendor Advisory
References () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.7 - Mailing List, Patch, Vendor Advisory () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.7 - Mailing List, Patch, Vendor Advisory
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8 - Mailing List, Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8 - Mailing List, Patch, Vendor Advisory
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad5d07f4a9cd671233ae20983848874731102c08 - Mailing List, Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad5d07f4a9cd671233ae20983848874731102c08 - Mailing List, Patch, Vendor Advisory
References () https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-cipso_v4_genopt - Exploit, Third Party Advisory () https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-cipso_v4_genopt - Exploit, Third Party Advisory
References () https://syzkaller.appspot.com/bug?id=96e7d345748d8814901c91cd92084ed04b46701e - Exploit, Mailing List, Third Party Advisory () https://syzkaller.appspot.com/bug?id=96e7d345748d8814901c91cd92084ed04b46701e - Exploit, Mailing List, Third Party Advisory

Information

Published : 2021-05-14 23:15

Updated : 2024-11-21 06:08


NVD link : CVE-2021-33033

Mitre link : CVE-2021-33033

CVE.ORG link : CVE-2021-33033


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free