Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2021-33631
PUBLISHED
More InfoOfficial Page
Assigner-openEuler
Assigner Org ID-7e1ac599-2767-43fa-b3ea-f10178cc98f2
View Known Exploited Vulnerability (KEV) details
Published At-18 Jan, 2024 | 15:05
Updated At-13 Feb, 2025 | 16:28
Rejected At-
▼CVE Numbering Authority (CNA)
Kernel crash in EXT4 filesystem

Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.

Affected Products
Vendor
openEuler (OpenAtom Foundation)openEuler
Product
kernel
Collection URL
https://gitee.com/src-openeuler
Package Name
kernel
Repo
https://gitee.com/src-openeuler/kernel
Modules
  • filesystem
Program Files
  • https://gitee.com/openeuler/kernel/blob/openEuler-22.03-LTS/fs/ext4/inline.c
Platforms
  • Linux
Default Status
unaffected
Versions
Affected
  • From 4.19.90 before 4.19.90-2401.3 (git)
    • -> unaffectedfromcf1d16ea2f1086c0765348344b70aa2361436642 ext4: fix kernel BUG in 'ext4_write_inline_data_end()'
  • From 5.10.0-60.18.0 before 5.10.0-183.0.0 (git)
    • -> unaffectedfrom1587126a0f2a79b3ee6cb309bbfaf079c39eda29 ext4: fix kernel BUG in 'ext4_write_inline_data_end()'
Problem Types
TypeCWE IDDescription
CWECWE-190CWE-190 Integer Overflow or Wraparound
Metrics
VersionBase scoreBase severityVector
3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-92CAPEC-92 Forced Integer Overflow
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030
N/A
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1031
N/A
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1032
N/A
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1033
N/A
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1034
N/A
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1035
N/A
https://gitee.com/src-openeuler/kernel/pulls/1389
N/A
https://gitee.com/src-openeuler/kernel/pulls/1396
N/A
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8
N/A
http://www.openwall.com/lists/oss-security/2024/01/30/3
N/A
http://www.openwall.com/lists/oss-security/2024/01/30/4
N/A
http://www.openwall.com/lists/oss-security/2024/01/30/5
N/A
http://www.openwall.com/lists/oss-security/2024/01/30/9
N/A
http://www.openwall.com/lists/oss-security/2024/01/30/10
N/A
http://www.openwall.com/lists/oss-security/2024/01/31/3
N/A
http://www.openwall.com/lists/oss-security/2024/01/31/2
N/A
http://www.openwall.com/lists/oss-security/2024/02/02/6
N/A
http://www.openwall.com/lists/oss-security/2024/02/02/9
N/A
http://www.openwall.com/lists/oss-security/2024/02/03/1
N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030
x_transferred
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1031
x_transferred
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1032
x_transferred
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1033
x_transferred
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1034
x_transferred
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1035
x_transferred
https://gitee.com/src-openeuler/kernel/pulls/1389
x_transferred
https://gitee.com/src-openeuler/kernel/pulls/1396
x_transferred
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8
x_transferred
http://www.openwall.com/lists/oss-security/2024/01/30/3
x_transferred
http://www.openwall.com/lists/oss-security/2024/01/30/4
x_transferred
http://www.openwall.com/lists/oss-security/2024/01/30/5
x_transferred
http://www.openwall.com/lists/oss-security/2024/01/30/9
x_transferred
http://www.openwall.com/lists/oss-security/2024/01/30/10
x_transferred
http://www.openwall.com/lists/oss-security/2024/01/31/3
x_transferred
http://www.openwall.com/lists/oss-security/2024/01/31/2
x_transferred
http://www.openwall.com/lists/oss-security/2024/02/02/6
x_transferred
http://www.openwall.com/lists/oss-security/2024/02/02/9
x_transferred
http://www.openwall.com/lists/oss-security/2024/02/03/1
x_transferred
Details not found