Linux kernel fix for i2c: virtio completion handling vulnerabilit
Reporter | Title | Published | Views | Family All 10 |
---|---|---|---|---|
![]() | Linux Distros Unpatched Vulnerability : CVE-2021-47613 | 5 Mar 202500:00 | – | nessus |
![]() | CVE-2021-47613 | 19 Jun 202415:15 | – | osv |
![]() | UBUNTU-CVE-2021-47613 | 19 Jun 202415:15 | – | osv |
![]() | CVE-2021-47613 i2c: virtio: fix completion handling | 19 Jun 202414:58 | – | vulnrichment |
![]() | CVE-2021-47613 | 19 Jun 202400:00 | – | ubuntucve |
![]() | CVE-2021-47613 | 19 Jun 202415:15 | – | cve |
![]() | CVE-2021-47613 | 20 Jun 202411:27 | – | redhatcve |
![]() | CVE-2021-47613 | 19 Jun 202415:15 | – | debiancve |
![]() | CVE-2021-47613 | 19 Jun 202415:15 | – | nvd |
![]() | ROS-20241204-02 | 4 Dec 202400:00 | – | redos |
[
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "unaffected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"drivers/i2c/busses/i2c-virtio.c"
],
"versions": [
{
"version": "3cfc88380413d20f777dc6648a38f683962e52bf",
"lessThan": "9cbb957441ed8873577d7d313a3d79d69f1dad5c",
"status": "affected",
"versionType": "git"
},
{
"version": "3cfc88380413d20f777dc6648a38f683962e52bf",
"lessThan": "b503de239f62eca898cfb7e820d9a35499137d22",
"status": "affected",
"versionType": "git"
}
]
},
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "affected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"drivers/i2c/busses/i2c-virtio.c"
],
"versions": [
{
"version": "5.15",
"status": "affected"
},
{
"version": "0",
"lessThan": "5.15",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.15.10",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"versionType": "semver"
},
{
"version": "5.16",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo