{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T07:04:37.635","vulnerabilities":[{"cve":{"id":"CVE-2021-33631","sourceIdentifier":"securities@openeuler.org","published":"2024-01-18T15:15:08.860","lastModified":"2025-04-02T18:33:53.340","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0."},{"lang":"es","value":"La vulnerabilidad de desbordamiento de enteros o envoltura en el kernel openEuler en Linux (módulos del sistema de archivos) permite el desbordamiento de enteros forzado. Este problema afecta al kernel de openEuler: desde 4.19.90 antes de 4.19.90-2401.3, desde 5.10.0-60.18.0 antes de 5.10.0-183.0 .0."}],"metrics":{"cvssMetricV31":[{"source":"securities@openeuler.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"securities@openeuler.org","type":"Secondary","description":[{"lang":"en","value":"CWE-190"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-190"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:openatom:openeuler:*:*:*:*:-:-:*:*","versionStartIncluding":"4.19.90","versionEndExcluding":"4.19.90-2401.3","matchCriteriaId":"4EA5A653-1671-4946-908D-6386C26019EF"},{"vulnerable":true,"criteria":"cpe:2.3:o:openatom:openeuler:*:*:*:*:-:linux:*:*","versionStartIncluding":"4.19.90","versionEndExcluding":"4.19.90-2401.3","matchCriteriaId":"54763EBE-1247-4B55-8D5A-1E292B70914D"},{"vulnerable":true,"criteria":"cpe:2.3:o:openatom:openeuler:*:*:*:*:-:-:*:*","versionStartIncluding":"5.10.0-60.18.0","versionEndExcluding":"5.10.0-183.0.0","matchCriteriaId":"4A7419FF-6F3C-4368-860B-485C09AA14D3"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2024/01/30/10","source":"securities@openeuler.org"},{"url":"http://www.openwall.com/lists/oss-security/2024/01/30/3","source":"securities@openeuler.org"},{"url":"http://www.openwall.com/lists/oss-security/2024/01/30/4","source":"securities@openeuler.org"},{"url":"http://www.openwall.com/lists/oss-security/2024/01/30/5","source":"securities@openeuler.org"},{"url":"http://www.openwall.com/lists/oss-security/2024/01/30/9","source":"securities@openeuler.org"},{"url":"http://www.openwall.com/lists/oss-security/2024/01/31/2","source":"securities@openeuler.org"},{"url":"http://www.openwall.com/lists/oss-security/2024/01/31/3","source":"securities@openeuler.org"},{"url":"http://www.openwall.com/lists/oss-security/2024/02/02/6","source":"securities@openeuler.org"},{"url":"http://www.openwall.com/lists/oss-security/2024/02/02/9","source":"securities@openeuler.org"},{"url":"http://www.openwall.com/lists/oss-security/2024/02/03/1","source":"securities@openeuler.org"},{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8","source":"securities@openeuler.org","tags":["Patch"]},{"url":"https://gitee.com/src-openeuler/kernel/pulls/1389","source":"securities@openeuler.org","tags":["Release Notes"]},{"url":"https://gitee.com/src-openeuler/kernel/pulls/1396","source":"securities@openeuler.org","tags":["Release Notes"]},{"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030","source":"securities@openeuler.org","tags":["Vendor Advisory"]},{"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1031","source":"securities@openeuler.org","tags":["Vendor Advisory"]},{"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1032","source":"securities@openeuler.org","tags":["Vendor Advisory"]},{"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1033","source":"securities@openeuler.org","tags":["Vendor Advisory"]},{"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1034","source":"securities@openeuler.org","tags":["Vendor Advisory"]},{"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1035","source":"securities@openeuler.org","tags":["Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2024/01/30/10","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2024/01/30/3","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2024/01/30/4","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2024/01/30/5","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2024/01/30/9","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2024/01/31/2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2024/01/31/3","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2024/02/02/6","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2024/02/02/9","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2024/02/03/1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://gitee.com/src-openeuler/kernel/pulls/1389","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"]},{"url":"https://gitee.com/src-openeuler/kernel/pulls/1396","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"]},{"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1031","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1032","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1033","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1034","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1035","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}