First published: Thu Dec 10 2020(Updated: )
A denial of service flaw was found in fuse_do_getattr in fs/fuse/dir.c in the kernel side of the FUSE filesystem in the Linux kernel. A local user could use this flaw to crash the system.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1160.53.1.rt56.1193.el7 | 0:3.10.0-1160.53.1.rt56.1193.el7 |
redhat/kernel | <0:3.10.0-1160.53.1.el7 | 0:3.10.0-1160.53.1.el7 |
redhat/kernel | <0:4.18.0-305.el8 | 0:4.18.0-305.el8 |
redhat/kernel-rt | <0:4.18.0-193.71.1.rt13.121.el8_2 | 0:4.18.0-193.71.1.rt13.121.el8_2 |
redhat/kernel | <0:4.18.0-193.71.1.el8_2 | 0:4.18.0-193.71.1.el8_2 |
redhat/Linux kernel | <5.11 | 5.11 |
Linux Linux kernel | <5.10.6 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Starwindsoftware Starwind Virtual San | =8-14338 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.106-3 6.1.112-1 6.11.4-1 6.11.5-1 |
As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions: # echo "install fuse /bin/true" >> /etc/modprobe.d/disable-fuse.conf The system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use. If the system requires this module to work correctly, this mitigation may not be suitable. If you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)