U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2021-47229

Change History

Initial Analysis by NIST 4/29/2025 3:42:00 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
NVD-CWE-noinfo
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to (excluding) 4.14.240
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.15 up to (excluding) 4.19.198
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.128
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.46
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.12.13
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/1a1dbc4473974867fe8c5f195c17b341c8e82867 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/3d213a4ddf49a860be6e795482c17f87e0c82b2a Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/400e6b1860c8be61388d0b77814c53260f96e17a Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/4c90f90a91d75c3c73dd633827c90e8746d9f54d Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/b00a9aaa4be20ad6e3311fb78a485eae0899e89a Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/f18139966d072dab8e4398c95ce955a9742e04f7 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/1a1dbc4473974867fe8c5f195c17b341c8e82867 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/3d213a4ddf49a860be6e795482c17f87e0c82b2a Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/400e6b1860c8be61388d0b77814c53260f96e17a Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/4c90f90a91d75c3c73dd633827c90e8746d9f54d Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/b00a9aaa4be20ad6e3311fb78a485eae0899e89a Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/f18139966d072dab8e4398c95ce955a9742e04f7 Types: Patch