Vulnerability Description
A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 5.15 |
| Redhat | Enterprise Linux | 7.0 |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2013242Issue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.htmlMailing ListThird Party Advisory
- https://lore.kernel.org/all/20211011134508.748956131%40linuxfoundation.org/
- https://www.debian.org/security/2022/dsa-5096Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2013242Issue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2022/03/msg00012.htmlMailing ListThird Party Advisory
- https://lore.kernel.org/all/20211011134508.748956131%40linuxfoundation.org/
- https://www.debian.org/security/2022/dsa-5096Third Party Advisory
FAQ
What is CVE-2021-20321?
CVE-2021-20321 is a vulnerability with a CVSS score of 4.7 (MEDIUM). A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system...
How severe is CVE-2021-20321?
CVE-2021-20321 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-20321?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Redhat Enterprise Linux, Debian Debian Linux.