vulnerability
Ubuntu: (CVE-2021-47210): linux vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Apr 10, 2024 | Nov 19, 2024 | Jul 16, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
Apr 10, 2024
Added
Nov 19, 2024
Modified
Jul 16, 2025
Description
In the Linux kernel, the following vulnerability has been resolved:
usb: typec: tipd: Remove WARN_ON in tps6598x_block_read
Calling tps6598x_block_read with a higher than allowed len can be
handled by just returning an error. There's no need to crash systems
with panic-on-warn enabled.
Solution(s)
no-fix-ubuntu-packageubuntu-upgrade-linuxubuntu-upgrade-linux-awsubuntu-upgrade-linux-aws-5-4ubuntu-upgrade-linux-aws-fipsubuntu-upgrade-linux-azureubuntu-upgrade-linux-azure-5-4ubuntu-upgrade-linux-azure-fipsubuntu-upgrade-linux-bluefieldubuntu-upgrade-linux-fipsubuntu-upgrade-linux-gcpubuntu-upgrade-linux-gcp-5-4ubuntu-upgrade-linux-gcp-fipsubuntu-upgrade-linux-gkeopubuntu-upgrade-linux-hwe-5-4ubuntu-upgrade-linux-ibmubuntu-upgrade-linux-ibm-5-4ubuntu-upgrade-linux-kvmubuntu-upgrade-linux-oracleubuntu-upgrade-linux-oracle-5-4ubuntu-upgrade-linux-raspiubuntu-upgrade-linux-raspi-5-4
References
- CVE-2021-47210
- https://attackerkb.com/topics/CVE-2021-47210
- URL-https://git.kernel.org/linus/b7a0a63f3fed57d413bb857de164ea9c3984bc4e
- URL-https://git.kernel.org/stable/c/2a897d384513ba7f7ef05611338b9a6ec6aeac00
- URL-https://git.kernel.org/stable/c/2c71811c963b6c310a29455d521d31a7ea6c5b5e
- URL-https://git.kernel.org/stable/c/30dcfcda8992dc42f18e7d35b6a1fa72372d382d
- URL-https://git.kernel.org/stable/c/b7a0a63f3fed57d413bb857de164ea9c3984bc4e
- URL-https://git.kernel.org/stable/c/eff8b7628410cb2eb562ca0d5d1f12e27063733e
- URL-https://www.cve.org/CVERecord?id=CVE-2021-47210

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.