U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2021-47117

Change History

Initial Analysis by NIST 2/26/2025 10:22:46 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
NVD-CWE-noinfo
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 from (excluding) 5.12.10
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 from (excluding) 5.10.43
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 from (excluding) 5.4.125
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.15 from (excluding) 4.19.194
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.10 from (excluding) 4.14.236
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.5 from (excluding) 4.9.272
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (excluding) 4.4.272
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/082cd4ec240b8734a82a89ffb890216ac98fec68 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/48105dc98c9ca35af418746277b087cb2bc6df7c Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/569496aa3776eea1ff0d49d0174ac1b7e861e107 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/5b3a9a2be59478b013a430ac57b0f3d65471b071 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/920697b004e49cb026e2e15fe91be065bf0741b7 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/d3b668b96ad3192c0581a248ae2f596cd054792a Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/d8116743ef5432336289256b2f7c117299213eb9 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/e33bafad30d34cfa5e9787cb099cab05e2677fcb Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/082cd4ec240b8734a82a89ffb890216ac98fec68 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/48105dc98c9ca35af418746277b087cb2bc6df7c Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/569496aa3776eea1ff0d49d0174ac1b7e861e107 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/5b3a9a2be59478b013a430ac57b0f3d65471b071 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/920697b004e49cb026e2e15fe91be065bf0741b7 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/d3b668b96ad3192c0581a248ae2f596cd054792a Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/d8116743ef5432336289256b2f7c117299213eb9 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/e33bafad30d34cfa5e9787cb099cab05e2677fcb Types: Patch