U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2021-47274

Change History

Initial Analysis by NIST 4/04/2025 10:29:40 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.12.11
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.9.258 up to (excluding) 4.9.273
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.14.222 up to (excluding) 4.14.237
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.19.177 up to (excluding) 4.19.195
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.4.99 up to (excluding) 5.4.126
          *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.10.17 up to (excluding) 5.10.44
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/2d598902799886d67947406f26ee8e5fd2ca097f Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/31ceae385556c37e4d286cb6378696448f566883 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/3e08a9f9760f4a70d633c328a76408e62d6f80a3 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/43c32c22254b9328d7abb1c2b0f689dc67838e60 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/b16a249eca2230c2cd66fa1d4b94743bd9b6ef92 Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/d63f00ec908b3be635ead5d6029cc94246e1f38d Types: Patch
Added Reference Type

								
							
							
						
CVE: https://git.kernel.org/stable/c/edcce01e0e50840a9aa6a70baed21477bdd2c9f9 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/2d598902799886d67947406f26ee8e5fd2ca097f Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/31ceae385556c37e4d286cb6378696448f566883 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/3e08a9f9760f4a70d633c328a76408e62d6f80a3 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/43c32c22254b9328d7abb1c2b0f689dc67838e60 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/b16a249eca2230c2cd66fa1d4b94743bd9b6ef92 Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/d63f00ec908b3be635ead5d6029cc94246e1f38d Types: Patch
Added Reference Type

								
							
							
						
kernel.org: https://git.kernel.org/stable/c/edcce01e0e50840a9aa6a70baed21477bdd2c9f9 Types: Patch