CVE-2021-47007 (GCVE-0-2021-47007)
Vulnerability from cvelistv5 – Published: 2024-02-28 08:13 – Updated: 2025-05-04 07:02
VLAI?
Title
f2fs: fix panic during f2fs_resize_fs()
Summary
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix panic during f2fs_resize_fs()
f2fs_resize_fs() hangs in below callstack with testcase:
- mkfs 16GB image & mount image
- dd 8GB fileA
- dd 8GB fileB
- sync
- rm fileA
- sync
- resize filesystem to 8GB
kernel BUG at segment.c:2484!
Call Trace:
allocate_segment_by_default+0x92/0xf0 [f2fs]
f2fs_allocate_data_block+0x44b/0x7e0 [f2fs]
do_write_page+0x5a/0x110 [f2fs]
f2fs_outplace_write_data+0x55/0x100 [f2fs]
f2fs_do_write_data_page+0x392/0x850 [f2fs]
move_data_page+0x233/0x320 [f2fs]
do_garbage_collect+0x14d9/0x1660 [f2fs]
free_segment_range+0x1f7/0x310 [f2fs]
f2fs_resize_fs+0x118/0x330 [f2fs]
__f2fs_ioctl+0x487/0x3680 [f2fs]
__x64_sys_ioctl+0x8e/0xd0
do_syscall_64+0x33/0x80
entry_SYSCALL_64_after_hwframe+0x44/0xa9
The root cause is we forgot to check that whether we have enough space
in resized filesystem to store all valid blocks in before-resizing
filesystem, then allocator will run out-of-space during block migration
in free_segment_range().
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
b4b10061ef98c583bcf82a4200703fbaa98c18dc , < 1c20a4896409f5ca1c770e1880c33d0a28a8b10f
(git)
Affected: b4b10061ef98c583bcf82a4200703fbaa98c18dc , < 860afd680d9cc1dabd61cda3cd246f60aa1eb705 (git) Affected: b4b10061ef98c583bcf82a4200703fbaa98c18dc , < 822054e5026c43b1dd60cf387dd999e95ee2ecc2 (git) Affected: b4b10061ef98c583bcf82a4200703fbaa98c18dc , < 3ab0598e6d860ef49d029943ba80f627c15c15d6 (git) |
||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-47007",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-28T21:09:48.777385Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:15:16.302Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-04T05:24:39.335Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/1c20a4896409f5ca1c770e1880c33d0a28a8b10f"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/860afd680d9cc1dabd61cda3cd246f60aa1eb705"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/822054e5026c43b1dd60cf387dd999e95ee2ecc2"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/3ab0598e6d860ef49d029943ba80f627c15c15d6"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"fs/f2fs/gc.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "1c20a4896409f5ca1c770e1880c33d0a28a8b10f",
"status": "affected",
"version": "b4b10061ef98c583bcf82a4200703fbaa98c18dc",
"versionType": "git"
},
{
"lessThan": "860afd680d9cc1dabd61cda3cd246f60aa1eb705",
"status": "affected",
"version": "b4b10061ef98c583bcf82a4200703fbaa98c18dc",
"versionType": "git"
},
{
"lessThan": "822054e5026c43b1dd60cf387dd999e95ee2ecc2",
"status": "affected",
"version": "b4b10061ef98c583bcf82a4200703fbaa98c18dc",
"versionType": "git"
},
{
"lessThan": "3ab0598e6d860ef49d029943ba80f627c15c15d6",
"status": "affected",
"version": "b4b10061ef98c583bcf82a4200703fbaa98c18dc",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"fs/f2fs/gc.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.8"
},
{
"lessThan": "5.8",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.38",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.11.*",
"status": "unaffected",
"version": "5.11.22",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"version": "5.12.5",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "5.13",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.38",
"versionStartIncluding": "5.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.11.22",
"versionStartIncluding": "5.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.12.5",
"versionStartIncluding": "5.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.13",
"versionStartIncluding": "5.8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix panic during f2fs_resize_fs()\n\nf2fs_resize_fs() hangs in below callstack with testcase:\n- mkfs 16GB image \u0026 mount image\n- dd 8GB fileA\n- dd 8GB fileB\n- sync\n- rm fileA\n- sync\n- resize filesystem to 8GB\n\nkernel BUG at segment.c:2484!\nCall Trace:\n allocate_segment_by_default+0x92/0xf0 [f2fs]\n f2fs_allocate_data_block+0x44b/0x7e0 [f2fs]\n do_write_page+0x5a/0x110 [f2fs]\n f2fs_outplace_write_data+0x55/0x100 [f2fs]\n f2fs_do_write_data_page+0x392/0x850 [f2fs]\n move_data_page+0x233/0x320 [f2fs]\n do_garbage_collect+0x14d9/0x1660 [f2fs]\n free_segment_range+0x1f7/0x310 [f2fs]\n f2fs_resize_fs+0x118/0x330 [f2fs]\n __f2fs_ioctl+0x487/0x3680 [f2fs]\n __x64_sys_ioctl+0x8e/0xd0\n do_syscall_64+0x33/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nThe root cause is we forgot to check that whether we have enough space\nin resized filesystem to store all valid blocks in before-resizing\nfilesystem, then allocator will run out-of-space during block migration\nin free_segment_range()."
}
],
"providerMetadata": {
"dateUpdated": "2025-05-04T07:02:11.875Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/1c20a4896409f5ca1c770e1880c33d0a28a8b10f"
},
{
"url": "https://git.kernel.org/stable/c/860afd680d9cc1dabd61cda3cd246f60aa1eb705"
},
{
"url": "https://git.kernel.org/stable/c/822054e5026c43b1dd60cf387dd999e95ee2ecc2"
},
{
"url": "https://git.kernel.org/stable/c/3ab0598e6d860ef49d029943ba80f627c15c15d6"
}
],
"title": "f2fs: fix panic during f2fs_resize_fs()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2021-47007",
"datePublished": "2024-02-28T08:13:27.159Z",
"dateReserved": "2024-02-27T18:42:55.952Z",
"dateUpdated": "2025-05-04T07:02:11.875Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2021-47007\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-02-28T09:15:38.507\",\"lastModified\":\"2025-01-08T17:58:51.337\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nf2fs: fix panic during f2fs_resize_fs()\\n\\nf2fs_resize_fs() hangs in below callstack with testcase:\\n- mkfs 16GB image \u0026 mount image\\n- dd 8GB fileA\\n- dd 8GB fileB\\n- sync\\n- rm fileA\\n- sync\\n- resize filesystem to 8GB\\n\\nkernel BUG at segment.c:2484!\\nCall Trace:\\n allocate_segment_by_default+0x92/0xf0 [f2fs]\\n f2fs_allocate_data_block+0x44b/0x7e0 [f2fs]\\n do_write_page+0x5a/0x110 [f2fs]\\n f2fs_outplace_write_data+0x55/0x100 [f2fs]\\n f2fs_do_write_data_page+0x392/0x850 [f2fs]\\n move_data_page+0x233/0x320 [f2fs]\\n do_garbage_collect+0x14d9/0x1660 [f2fs]\\n free_segment_range+0x1f7/0x310 [f2fs]\\n f2fs_resize_fs+0x118/0x330 [f2fs]\\n __f2fs_ioctl+0x487/0x3680 [f2fs]\\n __x64_sys_ioctl+0x8e/0xd0\\n do_syscall_64+0x33/0x80\\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\\n\\nThe root cause is we forgot to check that whether we have enough space\\nin resized filesystem to store all valid blocks in before-resizing\\nfilesystem, then allocator will run out-of-space during block migration\\nin free_segment_range().\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: corrige el p\u00e1nico durante f2fs_resize_fs() f2fs_resize_fs() se bloquea en la pila de llamadas debajo con el caso de prueba: - imagen mkfs de 16 GB y montaje de imagen - dd archivo A de 8 GB - agrega archivo B de 8 GB - sincronizaci\u00f3n - archivo rm A - sincronizaci\u00f3n - cambiar el tama\u00f1o del sistema de archivos al kernel de 8 GB \u00a1ERROR en segment.c:2484! Seguimiento de llamadas: allocate_segment_by_default+0x92/0xf0 [f2fs] f2fs_allocate_data_block+0x44b/0x7e0 [f2fs] do_write_page+0x5a/0x110 [f2fs] f2fs_outplace_write_data+0x55/0x100 [f2fs] f2fs_do_write_data_page +0x392/0x850 [f2fs] mover_p\u00e1gina_datos+0x233/0x320 [f2fs] ] do_garbage_collect+0x14d9/0x1660 [f2fs] free_segment_range+0x1f7/0x310 [f2fs] f2fs_resize_fs+0x118/0x330 [f2fs] __f2fs_ioctl+0x487/0x3680 [f2fs] __x64_sys_ioct l+0x8e/0xd0 do_syscall_64+0x33/0x80 Entry_SYSCALL_64_after_hwframe+0x44/0xa9 La ra\u00edz Porque olvidamos verificar si tenemos suficiente espacio en el sistema de archivos redimensionado para almacenar todos los bloques v\u00e1lidos en el sistema de archivos antes de cambiar el tama\u00f1o, entonces el asignador se quedar\u00e1 sin espacio durante la migraci\u00f3n de bloques en free_segment_range().\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.8\",\"versionEndExcluding\":\"5.10.38\",\"matchCriteriaId\":\"48EEEAD2-D08A-422C-8830-6CCF86E89E64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.11.22\",\"matchCriteriaId\":\"83B53E9A-F426-4C03-9A5F-A931FF79827E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.12\",\"versionEndExcluding\":\"5.12.5\",\"matchCriteriaId\":\"0274929A-B36C-4F4C-AB22-30A0DD6B995B\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1c20a4896409f5ca1c770e1880c33d0a28a8b10f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3ab0598e6d860ef49d029943ba80f627c15c15d6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/822054e5026c43b1dd60cf387dd999e95ee2ecc2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/860afd680d9cc1dabd61cda3cd246f60aa1eb705\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/1c20a4896409f5ca1c770e1880c33d0a28a8b10f\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3ab0598e6d860ef49d029943ba80f627c15c15d6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/822054e5026c43b1dd60cf387dd999e95ee2ecc2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/860afd680d9cc1dabd61cda3cd246f60aa1eb705\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/1c20a4896409f5ca1c770e1880c33d0a28a8b10f\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/860afd680d9cc1dabd61cda3cd246f60aa1eb705\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/822054e5026c43b1dd60cf387dd999e95ee2ecc2\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/3ab0598e6d860ef49d029943ba80f627c15c15d6\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:24:39.335Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-47007\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-02-28T21:09:48.777385Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-23T19:01:13.881Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"f2fs: fix panic during f2fs_resize_fs()\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"b4b10061ef98c583bcf82a4200703fbaa98c18dc\", \"lessThan\": \"1c20a4896409f5ca1c770e1880c33d0a28a8b10f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"b4b10061ef98c583bcf82a4200703fbaa98c18dc\", \"lessThan\": \"860afd680d9cc1dabd61cda3cd246f60aa1eb705\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"b4b10061ef98c583bcf82a4200703fbaa98c18dc\", \"lessThan\": \"822054e5026c43b1dd60cf387dd999e95ee2ecc2\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"b4b10061ef98c583bcf82a4200703fbaa98c18dc\", \"lessThan\": \"3ab0598e6d860ef49d029943ba80f627c15c15d6\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/f2fs/gc.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.8\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.8\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.10.38\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.11.22\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.11.*\"}, {\"status\": \"unaffected\", \"version\": \"5.12.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.12.*\"}, {\"status\": \"unaffected\", \"version\": \"5.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/f2fs/gc.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/1c20a4896409f5ca1c770e1880c33d0a28a8b10f\"}, {\"url\": \"https://git.kernel.org/stable/c/860afd680d9cc1dabd61cda3cd246f60aa1eb705\"}, {\"url\": \"https://git.kernel.org/stable/c/822054e5026c43b1dd60cf387dd999e95ee2ecc2\"}, {\"url\": \"https://git.kernel.org/stable/c/3ab0598e6d860ef49d029943ba80f627c15c15d6\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nf2fs: fix panic during f2fs_resize_fs()\\n\\nf2fs_resize_fs() hangs in below callstack with testcase:\\n- mkfs 16GB image \u0026 mount image\\n- dd 8GB fileA\\n- dd 8GB fileB\\n- sync\\n- rm fileA\\n- sync\\n- resize filesystem to 8GB\\n\\nkernel BUG at segment.c:2484!\\nCall Trace:\\n allocate_segment_by_default+0x92/0xf0 [f2fs]\\n f2fs_allocate_data_block+0x44b/0x7e0 [f2fs]\\n do_write_page+0x5a/0x110 [f2fs]\\n f2fs_outplace_write_data+0x55/0x100 [f2fs]\\n f2fs_do_write_data_page+0x392/0x850 [f2fs]\\n move_data_page+0x233/0x320 [f2fs]\\n do_garbage_collect+0x14d9/0x1660 [f2fs]\\n free_segment_range+0x1f7/0x310 [f2fs]\\n f2fs_resize_fs+0x118/0x330 [f2fs]\\n __f2fs_ioctl+0x487/0x3680 [f2fs]\\n __x64_sys_ioctl+0x8e/0xd0\\n do_syscall_64+0x33/0x80\\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\\n\\nThe root cause is we forgot to check that whether we have enough space\\nin resized filesystem to store all valid blocks in before-resizing\\nfilesystem, then allocator will run out-of-space during block migration\\nin free_segment_range().\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.38\", \"versionStartIncluding\": \"5.8\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.11.22\", \"versionStartIncluding\": \"5.8\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.12.5\", \"versionStartIncluding\": \"5.8\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.13\", \"versionStartIncluding\": \"5.8\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T07:02:11.875Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2021-47007\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T07:02:11.875Z\", \"dateReserved\": \"2024-02-27T18:42:55.952Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-02-28T08:13:27.159Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…