First published: Thu Jan 18 2024(Updated: )
Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.
Credit: securities@openeuler.org securities@openeuler.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.2 | 6.2 |
IBM QRadar Security Information and Event Manager | <=7.5 - 7.5.0 UP8 IF01 | |
openEuler | >=4.19.90<4.19.90-2401.3 | |
openEuler | >=4.19.90<4.19.90-2401.3 | |
openEuler | >=5.10.0-60.18.0<5.10.0-183.0.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33631 has a medium severity rating due to the potential for an integer overflow leading to various security issues.
To remedy CVE-2021-33631, upgrade to the latest kernel versions or apply patches as recommended by your distribution.
CVE-2021-33631 affects openEuler kernel versions prior to 4.19.90-2401.3 and 5.10.0-183.0.0, as well as IBM QRadar SIEM 7.5 - 7.5.0 UP8 IF01.
You may be vulnerable to CVE-2021-33631 if you are using affected versions of openEuler Linux or the specified IBM QRadar SIEM version.
Exploitation of CVE-2021-33631 could lead to system crashes or unauthorized access to sensitive data due to the forced integer overflow.