First published: Wed Jun 19 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ovl: fix warning in ovl_create_real() Syzbot triggered the following warning in ovl_workdir_create() -> ovl_create_real(): if (!err && WARN_ON(!newdentry->d_inode)) { The reason is that the cgroup2 filesystem returns from mkdir without instantiating the new dentry. Weird filesystems such as this will be rejected by overlayfs at a later stage during setup, but to prevent such a warning, call ovl_mkdir_real() directly from ovl_workdir_create() and reject this case early.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.19.222 | 4.19.222 |
redhat/kernel | <5.4.168 | 5.4.168 |
redhat/kernel | <5.10.88 | 5.10.88 |
redhat/kernel | <5.15.11 | 5.15.11 |
redhat/kernel | <5.16 | 5.16 |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47579 is classified as a medium severity vulnerability in the Linux kernel.
To fix CVE-2021-47579, update your Linux kernel to version 4.19.222, 5.4.168, 5.10.88, 5.15.11, or 5.16 as applicable.
CVE-2021-47579 affects certain versions of the Linux kernel on systems using the cgroup2 filesystem.
CVE-2021-47579 addresses a warning triggered in the Linux kernel related to the ovl_create_real function.
As of the last updates, there are no public reports confirming that CVE-2021-47579 is being actively exploited.