Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.
References
Link Providers
https://www.spirityenterprise.com/pentest spirity
https://www.spirityenterprise.com/managed-detection-response spirity
http://www.openwall.com/lists/oss-security/2024/01/30/10 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2024/01/30/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2024/01/30/4 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2024/01/30/5 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2024/01/30/9 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2024/01/31/2 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2024/01/31/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2024/02/02/6 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2024/02/02/9 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2024/02/03/1 cve-icon cve-icon
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8 cve-icon cve-icon
https://gitee.com/src-openeuler/kernel/pulls/1389 cve-icon cve-icon
https://gitee.com/src-openeuler/kernel/pulls/1396 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2021-33631 cve-icon
https://seclists.org/oss-sec/2024/q1/65 cve-icon
https://www.cve.org/CVERecord?id=CVE-2021-33631 cve-icon
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030 cve-icon cve-icon
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1031 cve-icon cve-icon
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1032 cve-icon cve-icon
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1033 cve-icon cve-icon
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1034 cve-icon cve-icon
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1035 cve-icon cve-icon
History

Wed, 02 Apr 2025 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Openatom
Openatom openeuler
CPEs cpe:2.3:o:huawei:openeuler:*:*:*:*:-:-:*:*
cpe:2.3:o:huawei:openeuler:*:*:*:*:-:linux:*:*
cpe:2.3:o:openatom:openeuler:*:*:*:*:-:-:*:*
cpe:2.3:o:openatom:openeuler:*:*:*:*:-:linux:*:*
Vendors & Products Huawei
Huawei openeuler
Openatom
Openatom openeuler

Fri, 14 Feb 2025 08:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Feb 2025 16:45:00 +0000

Type Values Removed Values Added
Description Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0. Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.

cve-icon MITRE

Status: PUBLISHED

Assigner: openEuler

Published:

Updated: 2025-02-13T16:28:21.561Z

Reserved: 2021-05-28T14:26:05.941Z

Link: CVE-2021-33631

cve-icon Vulnrichment

Updated: 2024-08-03T23:58:21.529Z

cve-icon NVD

Status : Modified

Published: 2024-01-18T15:15:08.860

Modified: 2025-04-02T18:33:53.340

Link: CVE-2021-33631

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-01-18T00:00:00Z

Links: CVE-2021-33631 - Bugzilla