CVE-2021-33631
Linux Kernel vulnerability analysis and mitigation

Overview

An Integer Overflow or Wraparound vulnerability was discovered in the openEuler kernel's filesystem modules (specifically in ext4) that allows Forced Integer Overflow. This vulnerability affects openEuler kernel versions from 4.19.90 before 4.19.90-2401.3, and from 5.10.0-60.18.0 before 5.10.0-183.0.0. The issue was discovered in 2022 and assigned CVE-2021-33631 (NVD).

Technical details

The vulnerability exists in the ext4_write_inline_data_end() function of the ext4 filesystem implementation. The issue occurs when an inode is converted to extent but the EXT4_STATE_MAY_INLINE_DATA flag check is missing, leading to a kernel BUG when pos + len > inline_size. The vulnerability has been assigned a CVSS v3.1 Base Score of 7.8 (High) by NVD and 5.5 (Medium) by openEuler (Kernel Patch).

Impact

When exploited, this vulnerability can cause a denial of service (system crash) through a kernel BUG when mounting a maliciously crafted ext4 filesystem image. The security impact was initially rated as high by NVD, though this assessment has been debated as potentially exaggerated given the actual attack requirements (OSS Security).

Mitigation and workarounds

The vulnerability has been fixed in multiple kernel versions including 4.14.312, 4.19.280, 5.4.240, 5.10.177, 5.15.87, 6.0.18, 6.1.4, and 6.2. The fix involves properly checking the EXT4_STATE_MAY_INLINE_DATA flag in ext4_write_end() before proceeding with inline data operations (Kernel Patch).

Community reactions

The vulnerability sparked discussions in the security community about the appropriate severity rating and the handling of filesystem corruption vulnerabilities. ChromeOS Security confirmed they treat filesystem vulnerabilities as security issues and provided reporting channels for such vulnerabilities through their bug bounty program (OSS Security).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-71142N/AN/A
  • Linux KernelLinux Kernel
  • kernel-zfcpdump-modules-core
NoNoJan 14, 2026
CVE-2025-71137N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel-matched
NoYesJan 14, 2026
CVE-2025-71135N/AN/A
  • Linux KernelLinux Kernel
  • kernel-doc
NoNoJan 14, 2026
CVE-2025-71134N/AN/A
  • Linux KernelLinux Kernel
  • kernel-abi-stablelists
NoNoJan 14, 2026
CVE-2025-71133N/AN/A
  • Linux KernelLinux Kernel
  • kernel-zfcpdump-modules
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management