First published: Tue May 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: lib/generic-radix-tree.c: Don't overflow in peek() When we started spreading new inode numbers throughout most of the 64 bit inode space, that triggered some corner case bugs, in particular some integer overflows related to the radix tree code. Oops.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.1.64 | 6.1.64 |
redhat/kernel | <6.5.13 | 6.5.13 |
redhat/kernel | <6.6.3 | 6.6.3 |
redhat/kernel | <6.7 | 6.7 |
Linux Kernel | <6.1.64 | |
Linux Kernel | >=6.2<6.5.13 | |
Linux Kernel | >=6.6<6.6.3 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47432 has been classified with medium severity due to its potential to cause integer overflows.
To resolve CVE-2021-47432, upgrade the Linux kernel to version 6.1.64 or later.
CVE-2021-47432 affects Linux kernel versions prior to 6.1.64, 6.5.13, 6.6.3, and 6.7.
CVE-2021-47432 impacts various Linux distributions and any systems running affected versions of the kernel.
There are no recommended workarounds for CVE-2021-47432; the best mitigation is to apply the updates.