First published: Thu Mar 04 2021(Updated: )
A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.36.2.rt56.1179.el7 | 0:3.10.0-1160.36.2.rt56.1179.el7 |
redhat/kernel | <0:3.10.0-1160.36.2.el7 | 0:3.10.0-1160.36.2.el7 |
redhat/kernel-rt | <0:4.18.0-348.rt7.130.el8 | 0:4.18.0-348.rt7.130.el8 |
redhat/kernel | <0:4.18.0-348.el8 | 0:4.18.0-348.el8 |
redhat/Kernel | <5.12 | 5.12 |
Linux Kernel | <5.11.14 | |
IBM Data Risk Manager | <=2.0.6 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 |
The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-33033 is classified as a critical vulnerability due to its potential to allow local users to crash the system or escalate privileges.
To remediate CVE-2021-33033, upgrade to the patched kernel versions specified by your Linux distribution.
CVE-2021-33033 affects Linux kernel versions up to 5.11.14, including certain Red Hat and Debian versions.
CVE-2021-33033 is considered a local vulnerability, meaning it requires local access to the system to exploit.
CVE-2021-33033 poses a significant security risk as it allows local users to potentially escalate privileges or crash the system.