{"id":"CVE-2020-36322","details":"An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.","modified":"2026-03-15T22:36:02.144990Z","published":"2021-04-14T06:15:12.437Z","related":["ALSA-2021:1578","SUSE-SU-2021:1238-1","SUSE-SU-2021:14724-1","SUSE-SU-2021:1572-1","SUSE-SU-2021:1573-1","SUSE-SU-2021:1595-1","SUSE-SU-2021:1596-1","SUSE-SU-2021:1605-1","SUSE-SU-2021:1617-1","SUSE-SU-2021:1623-1","SUSE-SU-2021:1624-1","SUSE-SU-2021:1715-1","SUSE-SU-2021:1724-1","SUSE-SU-2021:1728-1","SUSE-SU-2021:1733-1","SUSE-SU-2021:1865-1","SUSE-SU-2021:1870-1","SUSE-SU-2021:1975-1","SUSE-SU-2021:1977-1","SUSE-SU-2021:2198-1","SUSE-SU-2021:2577-1","openSUSE-SU-2021:0579-1","openSUSE-SU-2021:1975-1","openSUSE-SU-2021:1977-1"],"references":[{"type":"ADVISORY","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.6"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5096"},{"type":"ADVISORY","url":"https://www.starwindsoftware.com/security/sw-20220816-0001/"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d069dbe8aaf2a197142558b6fb2978189ba3454"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.10.6"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8-14338"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-36322.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}