First published: Tue Jul 16 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change The refcount leak issues take place in an error handling path. When the 3rd argument buf doesn't match with "offline", "online" or "remove", the function simply returns -EINVAL and forgets to decrease the reference count of a rpc_xprt object and a rpc_xprt_switch object increased by rpc_sysfs_xprt_kobj_get_xprt() and rpc_sysfs_xprt_kobj_get_xprt_switch(), causing reference count leaks of both unused objects. Fix this issue by jumping to the error handling path labelled with out_put when buf matches none of "offline", "online" or "remove".
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.15.24 | 5.15.24 |
redhat/kernel | <5.16.10 | 5.16.10 |
redhat/kernel | <5.17 | 5.17 |
Linux Kernel | <5.15.24 | |
Linux Kernel | >=5.16<5.16.10 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47624 is classified as a medium severity vulnerability due to its impact on the Linux kernel's reference counting mechanism.
To mitigate CVE-2021-47624, upgrade to kernel versions 5.15.24, 5.16.10, or 5.17 as specified in the advisory.
CVE-2021-47624 affects Linux kernel versions prior to 5.15.24, 5.16.10, and 5.17.
CVE-2021-47624 involves reference count leaks in the error handling path of the net/sunrpc component.
There are no recommended workarounds for CVE-2021-47624; the proper solution is to apply the appropriate kernel updates.