Lucene search

K
cve[email protected]CVE-2021-33631
HistoryJan 18, 2024 - 3:15 p.m.

CVE-2021-33631

2024-01-1815:15:08
CWE-190
web.nvd.nist.gov
28
cve-2021-33631
openeuler
kernel
linux
integer overflow
vulnerability
nvd

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.2%

Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.

Affected configurations

NVD
Node
huaweiopeneulerRange4.19.904.19.90-2401.3--
OR
huaweiopeneulerRange4.19.904.19.90-2401.3-linux
OR
huaweiopeneulerRange5.10.0-60.18.05.10.0-183.0.0--

CNA Affected

[
  {
    "collectionURL": "https://gitee.com/src-openeuler",
    "defaultStatus": "unaffected",
    "modules": [
      "filesystem"
    ],
    "packageName": "kernel",
    "platforms": [
      "Linux"
    ],
    "product": "kernel",
    "programFiles": [
      "https://gitee.com/openeuler/kernel/blob/openEuler-22.03-LTS/fs/ext4/inline.c"
    ],
    "repo": "https://gitee.com/src-openeuler/kernel",
    "vendor": "openEuler",
    "versions": [
      {
        "changes": [
          {
            "at": "cf1d16ea2f1086c0765348344b70aa2361436642 ext4: fix kernel BUG in 'ext4_write_inline_data_end()'",
            "status": "unaffected"
          }
        ],
        "lessThan": "4.19.90-2401.3",
        "status": "affected",
        "version": "4.19.90",
        "versionType": "git"
      },
      {
        "changes": [
          {
            "at": "1587126a0f2a79b3ee6cb309bbfaf079c39eda29 ext4: fix kernel BUG in 'ext4_write_inline_data_end()'",
            "status": "unaffected"
          }
        ],
        "lessThan": "5.10.0-183.0.0",
        "status": "affected",
        "version": "5.10.0-60.18.0",
        "versionType": "git"
      }
    ]
  }
]

References

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.2%