CVE-2021-47579: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ovl: fix warning in ovl_create_real() Syzbot triggered the following warning in ovl_workdir_create() -> ovl_create_real(): if (!err && WARN_ON(!newdentry->d_inode)) { The reason is that the cgroup2 filesystem returns from mkdir without instantiating the new dentry. Weird filesystems such as this will be rejected by overlayfs at a later stage during setup, but to prevent such a warning, call ovl_mkdir_real() directly from ovl_workdir_create() and reject this case early.
AI Analysis
Technical Summary
CVE-2021-47579 is a vulnerability identified in the Linux kernel's overlay filesystem (overlayfs) implementation. The issue arises from how overlayfs handles directory creation when interacting with certain filesystems, specifically the cgroup2 filesystem. The vulnerability was discovered when Syzbot, an automated kernel fuzzer, triggered a warning in the function ovl_workdir_create(), which calls ovl_create_real(). The root cause is that the cgroup2 filesystem's mkdir operation returns without instantiating the new dentry (directory entry), which is unexpected behavior. Overlayfs expects a valid dentry with an associated inode after mkdir, but in this case, the new dentry's inode pointer is null. This leads to a warning condition (WARN_ON) in the kernel, indicating an abnormal state. The vulnerability does not directly cause a crash or memory corruption but indicates a logic flaw in overlayfs's handling of unusual filesystems. The fix involves changing overlayfs to call ovl_mkdir_real() directly from ovl_workdir_create() and rejecting cases where the new dentry is not properly instantiated early in the process, preventing the warning and potential undefined behavior later during overlayfs setup. This patch improves the robustness of overlayfs against edge cases involving filesystems like cgroup2 that do not behave as typical filesystems during directory creation. No known exploits are currently reported in the wild, and the vulnerability appears to be more of a stability and correctness issue rather than a direct security compromise vector. However, because overlayfs is widely used in container environments and other Linux-based systems, improper handling of filesystem operations could potentially be leveraged in complex attack scenarios or cause denial of service due to kernel warnings or instability.
Potential Impact
For European organizations, the impact of CVE-2021-47579 is primarily related to system stability and reliability rather than direct compromise or data breach. Overlayfs is commonly used in containerization technologies such as Docker and Kubernetes, which are widely deployed in enterprise environments across Europe. A failure or warning in overlayfs could lead to container startup failures or unexpected behavior in containerized applications, potentially disrupting business operations. Although there is no evidence of active exploitation, the vulnerability could be leveraged in targeted attacks aiming to cause denial of service or to exploit subsequent kernel bugs triggered by this unexpected state. Organizations relying heavily on Linux containers or cgroup2 features should be aware of this vulnerability as it affects the underlying kernel filesystem operations. The impact on confidentiality and integrity is low, but availability could be affected if the kernel warnings escalate to crashes or resource exhaustion. Given the critical role of Linux in European IT infrastructure, especially in cloud and hosting providers, this vulnerability warrants timely patching to maintain operational stability.
Mitigation Recommendations
European organizations should apply the Linux kernel patch that addresses CVE-2021-47579 as soon as it becomes available in their distribution's kernel updates. Specifically, updating to a kernel version that includes the fix for overlayfs handling of cgroup2 mkdir operations is essential. For containerized environments, ensure that container runtimes and orchestration platforms are also updated to versions compatible with the patched kernel. Additionally, organizations should monitor kernel logs for WARN_ON messages related to overlayfs and cgroup2 to detect any attempts to trigger this condition. As a proactive measure, limit the use of overlayfs with unusual or experimental filesystems until patches are applied. Security teams should also review container and host filesystem configurations to minimize exposure to this edge case. Finally, maintain robust kernel update policies and test patches in staging environments to prevent operational disruptions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2021-47579: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ovl: fix warning in ovl_create_real() Syzbot triggered the following warning in ovl_workdir_create() -> ovl_create_real(): if (!err && WARN_ON(!newdentry->d_inode)) { The reason is that the cgroup2 filesystem returns from mkdir without instantiating the new dentry. Weird filesystems such as this will be rejected by overlayfs at a later stage during setup, but to prevent such a warning, call ovl_mkdir_real() directly from ovl_workdir_create() and reject this case early.
AI-Powered Analysis
Technical Analysis
CVE-2021-47579 is a vulnerability identified in the Linux kernel's overlay filesystem (overlayfs) implementation. The issue arises from how overlayfs handles directory creation when interacting with certain filesystems, specifically the cgroup2 filesystem. The vulnerability was discovered when Syzbot, an automated kernel fuzzer, triggered a warning in the function ovl_workdir_create(), which calls ovl_create_real(). The root cause is that the cgroup2 filesystem's mkdir operation returns without instantiating the new dentry (directory entry), which is unexpected behavior. Overlayfs expects a valid dentry with an associated inode after mkdir, but in this case, the new dentry's inode pointer is null. This leads to a warning condition (WARN_ON) in the kernel, indicating an abnormal state. The vulnerability does not directly cause a crash or memory corruption but indicates a logic flaw in overlayfs's handling of unusual filesystems. The fix involves changing overlayfs to call ovl_mkdir_real() directly from ovl_workdir_create() and rejecting cases where the new dentry is not properly instantiated early in the process, preventing the warning and potential undefined behavior later during overlayfs setup. This patch improves the robustness of overlayfs against edge cases involving filesystems like cgroup2 that do not behave as typical filesystems during directory creation. No known exploits are currently reported in the wild, and the vulnerability appears to be more of a stability and correctness issue rather than a direct security compromise vector. However, because overlayfs is widely used in container environments and other Linux-based systems, improper handling of filesystem operations could potentially be leveraged in complex attack scenarios or cause denial of service due to kernel warnings or instability.
Potential Impact
For European organizations, the impact of CVE-2021-47579 is primarily related to system stability and reliability rather than direct compromise or data breach. Overlayfs is commonly used in containerization technologies such as Docker and Kubernetes, which are widely deployed in enterprise environments across Europe. A failure or warning in overlayfs could lead to container startup failures or unexpected behavior in containerized applications, potentially disrupting business operations. Although there is no evidence of active exploitation, the vulnerability could be leveraged in targeted attacks aiming to cause denial of service or to exploit subsequent kernel bugs triggered by this unexpected state. Organizations relying heavily on Linux containers or cgroup2 features should be aware of this vulnerability as it affects the underlying kernel filesystem operations. The impact on confidentiality and integrity is low, but availability could be affected if the kernel warnings escalate to crashes or resource exhaustion. Given the critical role of Linux in European IT infrastructure, especially in cloud and hosting providers, this vulnerability warrants timely patching to maintain operational stability.
Mitigation Recommendations
European organizations should apply the Linux kernel patch that addresses CVE-2021-47579 as soon as it becomes available in their distribution's kernel updates. Specifically, updating to a kernel version that includes the fix for overlayfs handling of cgroup2 mkdir operations is essential. For containerized environments, ensure that container runtimes and orchestration platforms are also updated to versions compatible with the patched kernel. Additionally, organizations should monitor kernel logs for WARN_ON messages related to overlayfs and cgroup2 to detect any attempts to trigger this condition. As a proactive measure, limit the use of overlayfs with unusual or experimental filesystems until patches are applied. Security teams should also review container and host filesystem configurations to minimize exposure to this edge case. Finally, maintain robust kernel update policies and test patches in staging environments to prevent operational disruptions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-24T15:11:00.730Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe94f3
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 6/30/2025, 2:55:47 PM
Last updated: 10/16/2025, 12:43:32 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalFuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking
MediumCVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.