CVE-2021-47117 (GCVE-0-2021-47117)
Vulnerability from cvelistv5
Published
2024-03-15 20:14
Modified
2025-12-18 11:35
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed We got follow bug_on when run fsstress with injecting IO fault: [130747.323114] kernel BUG at fs/ext4/extents_status.c:762! [130747.323117] Internal error: Oops - BUG: 0 [#1] SMP ...... [130747.334329] Call trace: [130747.334553] ext4_es_cache_extent+0x150/0x168 [ext4] [130747.334975] ext4_cache_extents+0x64/0xe8 [ext4] [130747.335368] ext4_find_extent+0x300/0x330 [ext4] [130747.335759] ext4_ext_map_blocks+0x74/0x1178 [ext4] [130747.336179] ext4_map_blocks+0x2f4/0x5f0 [ext4] [130747.336567] ext4_mpage_readpages+0x4a8/0x7a8 [ext4] [130747.336995] ext4_readpage+0x54/0x100 [ext4] [130747.337359] generic_file_buffered_read+0x410/0xae8 [130747.337767] generic_file_read_iter+0x114/0x190 [130747.338152] ext4_file_read_iter+0x5c/0x140 [ext4] [130747.338556] __vfs_read+0x11c/0x188 [130747.338851] vfs_read+0x94/0x150 [130747.339110] ksys_read+0x74/0xf0 This patch's modification is according to Jan Kara's suggestion in: https://patchwork.ozlabs.org/project/linux-ext4/patch/20210428085158.3728201-1-yebin10@huawei.com/ "I see. Now I understand your patch. Honestly, seeing how fragile is trying to fix extent tree after split has failed in the middle, I would probably go even further and make sure we fix the tree properly in case of ENOSPC and EDQUOT (those are easily user triggerable). Anything else indicates a HW problem or fs corruption so I'd rather leave the extent tree as is and don't try to fix it (which also means we will not create overlapping extents)."
Impacted products
Vendor Product Version
Linux Linux Version: adb2355104b2109e06ba5276485d187d023b2fd2
Version: adb2355104b2109e06ba5276485d187d023b2fd2
Version: adb2355104b2109e06ba5276485d187d023b2fd2
Version: adb2355104b2109e06ba5276485d187d023b2fd2
Version: adb2355104b2109e06ba5276485d187d023b2fd2
Version: adb2355104b2109e06ba5276485d187d023b2fd2
Version: adb2355104b2109e06ba5276485d187d023b2fd2
Version: adb2355104b2109e06ba5276485d187d023b2fd2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-47117",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-18T14:32:59.932623Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:13:39.668Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:24:39.794Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/e33bafad30d34cfa5e9787cb099cab05e2677fcb"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/5b3a9a2be59478b013a430ac57b0f3d65471b071"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/d8116743ef5432336289256b2f7c117299213eb9"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/569496aa3776eea1ff0d49d0174ac1b7e861e107"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/920697b004e49cb026e2e15fe91be065bf0741b7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/d3b668b96ad3192c0581a248ae2f596cd054792a"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/48105dc98c9ca35af418746277b087cb2bc6df7c"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/082cd4ec240b8734a82a89ffb890216ac98fec68"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/ext4/extents.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "e33bafad30d34cfa5e9787cb099cab05e2677fcb",
              "status": "affected",
              "version": "adb2355104b2109e06ba5276485d187d023b2fd2",
              "versionType": "git"
            },
            {
              "lessThan": "5b3a9a2be59478b013a430ac57b0f3d65471b071",
              "status": "affected",
              "version": "adb2355104b2109e06ba5276485d187d023b2fd2",
              "versionType": "git"
            },
            {
              "lessThan": "d8116743ef5432336289256b2f7c117299213eb9",
              "status": "affected",
              "version": "adb2355104b2109e06ba5276485d187d023b2fd2",
              "versionType": "git"
            },
            {
              "lessThan": "569496aa3776eea1ff0d49d0174ac1b7e861e107",
              "status": "affected",
              "version": "adb2355104b2109e06ba5276485d187d023b2fd2",
              "versionType": "git"
            },
            {
              "lessThan": "920697b004e49cb026e2e15fe91be065bf0741b7",
              "status": "affected",
              "version": "adb2355104b2109e06ba5276485d187d023b2fd2",
              "versionType": "git"
            },
            {
              "lessThan": "d3b668b96ad3192c0581a248ae2f596cd054792a",
              "status": "affected",
              "version": "adb2355104b2109e06ba5276485d187d023b2fd2",
              "versionType": "git"
            },
            {
              "lessThan": "48105dc98c9ca35af418746277b087cb2bc6df7c",
              "status": "affected",
              "version": "adb2355104b2109e06ba5276485d187d023b2fd2",
              "versionType": "git"
            },
            {
              "lessThan": "082cd4ec240b8734a82a89ffb890216ac98fec68",
              "status": "affected",
              "version": "adb2355104b2109e06ba5276485d187d023b2fd2",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "fs/ext4/extents.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "3.9"
            },
            {
              "lessThan": "3.9",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.4.*",
              "status": "unaffected",
              "version": "4.4.272",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.9.*",
              "status": "unaffected",
              "version": "4.9.272",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.236",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.194",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.125",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.43",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.12.*",
              "status": "unaffected",
              "version": "5.12.10",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "5.13",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.4.272",
                  "versionStartIncluding": "3.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.9.272",
                  "versionStartIncluding": "3.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.236",
                  "versionStartIncluding": "3.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.194",
                  "versionStartIncluding": "3.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.125",
                  "versionStartIncluding": "3.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.43",
                  "versionStartIncluding": "3.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.12.10",
                  "versionStartIncluding": "3.9",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.13",
                  "versionStartIncluding": "3.9",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed\n\nWe got follow bug_on when run fsstress with injecting IO fault:\n[130747.323114] kernel BUG at fs/ext4/extents_status.c:762!\n[130747.323117] Internal error: Oops - BUG: 0 [#1] SMP\n......\n[130747.334329] Call trace:\n[130747.334553]  ext4_es_cache_extent+0x150/0x168 [ext4]\n[130747.334975]  ext4_cache_extents+0x64/0xe8 [ext4]\n[130747.335368]  ext4_find_extent+0x300/0x330 [ext4]\n[130747.335759]  ext4_ext_map_blocks+0x74/0x1178 [ext4]\n[130747.336179]  ext4_map_blocks+0x2f4/0x5f0 [ext4]\n[130747.336567]  ext4_mpage_readpages+0x4a8/0x7a8 [ext4]\n[130747.336995]  ext4_readpage+0x54/0x100 [ext4]\n[130747.337359]  generic_file_buffered_read+0x410/0xae8\n[130747.337767]  generic_file_read_iter+0x114/0x190\n[130747.338152]  ext4_file_read_iter+0x5c/0x140 [ext4]\n[130747.338556]  __vfs_read+0x11c/0x188\n[130747.338851]  vfs_read+0x94/0x150\n[130747.339110]  ksys_read+0x74/0xf0\n\nThis patch\u0027s modification is according to Jan Kara\u0027s suggestion in:\nhttps://patchwork.ozlabs.org/project/linux-ext4/patch/20210428085158.3728201-1-yebin10@huawei.com/\n\"I see. Now I understand your patch. Honestly, seeing how fragile is trying\nto fix extent tree after split has failed in the middle, I would probably\ngo even further and make sure we fix the tree properly in case of ENOSPC\nand EDQUOT (those are easily user triggerable).  Anything else indicates a\nHW problem or fs corruption so I\u0027d rather leave the extent tree as is and\ndon\u0027t try to fix it (which also means we will not create overlapping\nextents).\""
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-18T11:35:41.694Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/e33bafad30d34cfa5e9787cb099cab05e2677fcb"
        },
        {
          "url": "https://git.kernel.org/stable/c/5b3a9a2be59478b013a430ac57b0f3d65471b071"
        },
        {
          "url": "https://git.kernel.org/stable/c/d8116743ef5432336289256b2f7c117299213eb9"
        },
        {
          "url": "https://git.kernel.org/stable/c/569496aa3776eea1ff0d49d0174ac1b7e861e107"
        },
        {
          "url": "https://git.kernel.org/stable/c/920697b004e49cb026e2e15fe91be065bf0741b7"
        },
        {
          "url": "https://git.kernel.org/stable/c/d3b668b96ad3192c0581a248ae2f596cd054792a"
        },
        {
          "url": "https://git.kernel.org/stable/c/48105dc98c9ca35af418746277b087cb2bc6df7c"
        },
        {
          "url": "https://git.kernel.org/stable/c/082cd4ec240b8734a82a89ffb890216ac98fec68"
        }
      ],
      "title": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2021-47117",
    "datePublished": "2024-03-15T20:14:24.291Z",
    "dateReserved": "2024-03-04T18:12:48.838Z",
    "dateUpdated": "2025-12-18T11:35:41.694Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/e33bafad30d34cfa5e9787cb099cab05e2677fcb\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/5b3a9a2be59478b013a430ac57b0f3d65471b071\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/d8116743ef5432336289256b2f7c117299213eb9\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/569496aa3776eea1ff0d49d0174ac1b7e861e107\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/920697b004e49cb026e2e15fe91be065bf0741b7\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/d3b668b96ad3192c0581a248ae2f596cd054792a\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/48105dc98c9ca35af418746277b087cb2bc6df7c\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/082cd4ec240b8734a82a89ffb890216ac98fec68\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:24:39.794Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-47117\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-03-18T14:32:59.932623Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-23T19:01:18.180Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"adb2355104b2109e06ba5276485d187d023b2fd2\", \"lessThan\": \"e33bafad30d34cfa5e9787cb099cab05e2677fcb\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"adb2355104b2109e06ba5276485d187d023b2fd2\", \"lessThan\": \"5b3a9a2be59478b013a430ac57b0f3d65471b071\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"adb2355104b2109e06ba5276485d187d023b2fd2\", \"lessThan\": \"d8116743ef5432336289256b2f7c117299213eb9\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"adb2355104b2109e06ba5276485d187d023b2fd2\", \"lessThan\": \"569496aa3776eea1ff0d49d0174ac1b7e861e107\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"adb2355104b2109e06ba5276485d187d023b2fd2\", \"lessThan\": \"920697b004e49cb026e2e15fe91be065bf0741b7\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"adb2355104b2109e06ba5276485d187d023b2fd2\", \"lessThan\": \"d3b668b96ad3192c0581a248ae2f596cd054792a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"adb2355104b2109e06ba5276485d187d023b2fd2\", \"lessThan\": \"48105dc98c9ca35af418746277b087cb2bc6df7c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"adb2355104b2109e06ba5276485d187d023b2fd2\", \"lessThan\": \"082cd4ec240b8734a82a89ffb890216ac98fec68\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/ext4/extents.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.9\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"3.9\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.4.272\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.4.*\"}, {\"status\": \"unaffected\", \"version\": \"4.9.272\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.9.*\"}, {\"status\": \"unaffected\", \"version\": \"4.14.236\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.14.*\"}, {\"status\": \"unaffected\", \"version\": \"4.19.194\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.125\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.43\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.12.10\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.12.*\"}, {\"status\": \"unaffected\", \"version\": \"5.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/ext4/extents.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/e33bafad30d34cfa5e9787cb099cab05e2677fcb\"}, {\"url\": \"https://git.kernel.org/stable/c/5b3a9a2be59478b013a430ac57b0f3d65471b071\"}, {\"url\": \"https://git.kernel.org/stable/c/d8116743ef5432336289256b2f7c117299213eb9\"}, {\"url\": \"https://git.kernel.org/stable/c/569496aa3776eea1ff0d49d0174ac1b7e861e107\"}, {\"url\": \"https://git.kernel.org/stable/c/920697b004e49cb026e2e15fe91be065bf0741b7\"}, {\"url\": \"https://git.kernel.org/stable/c/d3b668b96ad3192c0581a248ae2f596cd054792a\"}, {\"url\": \"https://git.kernel.org/stable/c/48105dc98c9ca35af418746277b087cb2bc6df7c\"}, {\"url\": \"https://git.kernel.org/stable/c/082cd4ec240b8734a82a89ffb890216ac98fec68\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\next4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed\\n\\nWe got follow bug_on when run fsstress with injecting IO fault:\\n[130747.323114] kernel BUG at fs/ext4/extents_status.c:762!\\n[130747.323117] Internal error: Oops - BUG: 0 [#1] SMP\\n......\\n[130747.334329] Call trace:\\n[130747.334553]  ext4_es_cache_extent+0x150/0x168 [ext4]\\n[130747.334975]  ext4_cache_extents+0x64/0xe8 [ext4]\\n[130747.335368]  ext4_find_extent+0x300/0x330 [ext4]\\n[130747.335759]  ext4_ext_map_blocks+0x74/0x1178 [ext4]\\n[130747.336179]  ext4_map_blocks+0x2f4/0x5f0 [ext4]\\n[130747.336567]  ext4_mpage_readpages+0x4a8/0x7a8 [ext4]\\n[130747.336995]  ext4_readpage+0x54/0x100 [ext4]\\n[130747.337359]  generic_file_buffered_read+0x410/0xae8\\n[130747.337767]  generic_file_read_iter+0x114/0x190\\n[130747.338152]  ext4_file_read_iter+0x5c/0x140 [ext4]\\n[130747.338556]  __vfs_read+0x11c/0x188\\n[130747.338851]  vfs_read+0x94/0x150\\n[130747.339110]  ksys_read+0x74/0xf0\\n\\nThis patch\u0027s modification is according to Jan Kara\u0027s suggestion in:\\nhttps://patchwork.ozlabs.org/project/linux-ext4/patch/20210428085158.3728201-1-yebin10@huawei.com/\\n\\\"I see. Now I understand your patch. Honestly, seeing how fragile is trying\\nto fix extent tree after split has failed in the middle, I would probably\\ngo even further and make sure we fix the tree properly in case of ENOSPC\\nand EDQUOT (those are easily user triggerable).  Anything else indicates a\\nHW problem or fs corruption so I\u0027d rather leave the extent tree as is and\\ndon\u0027t try to fix it (which also means we will not create overlapping\\nextents).\\\"\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.4.272\", \"versionStartIncluding\": \"3.9\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.9.272\", \"versionStartIncluding\": \"3.9\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.14.236\", \"versionStartIncluding\": \"3.9\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.194\", \"versionStartIncluding\": \"3.9\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.125\", \"versionStartIncluding\": \"3.9\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.43\", \"versionStartIncluding\": \"3.9\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.12.10\", \"versionStartIncluding\": \"3.9\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.13\", \"versionStartIncluding\": \"3.9\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-12-18T11:35:41.694Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2021-47117\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-12-18T11:35:41.694Z\", \"dateReserved\": \"2024-03-04T18:12:48.838Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-03-15T20:14:24.291Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…