CVE-2021-47464

In the Linux kernel, the following vulnerability has been resolved: audit: fix possible null-pointer dereference in audit_filter_rules Fix possible null-pointer dereference in audit_filter_rules. audit_filter_rules() error: we previously assumed 'ctx' could be null
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*

History

02 Apr 2025, 15:11

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/16802fa4c33eb1a8efb23f1e93365190e4047d05 - () https://git.kernel.org/stable/c/16802fa4c33eb1a8efb23f1e93365190e4047d05 - Patch
References () https://git.kernel.org/stable/c/4e9e46a700201b4c85081fd478c99c692a9aaa0d - () https://git.kernel.org/stable/c/4e9e46a700201b4c85081fd478c99c692a9aaa0d - Patch
References () https://git.kernel.org/stable/c/6e3ee990c90494561921c756481d0e2125d8b895 - () https://git.kernel.org/stable/c/6e3ee990c90494561921c756481d0e2125d8b895 - Patch
References () https://git.kernel.org/stable/c/d6f451f1f60c58d73038c7c3177066f8f084e2a2 - () https://git.kernel.org/stable/c/d6f451f1f60c58d73038c7c3177066f8f084e2a2 - Patch
CPE cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

21 Nov 2024, 06:36

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/16802fa4c33eb1a8efb23f1e93365190e4047d05 - () https://git.kernel.org/stable/c/16802fa4c33eb1a8efb23f1e93365190e4047d05 -
References () https://git.kernel.org/stable/c/4e9e46a700201b4c85081fd478c99c692a9aaa0d - () https://git.kernel.org/stable/c/4e9e46a700201b4c85081fd478c99c692a9aaa0d -
References () https://git.kernel.org/stable/c/6e3ee990c90494561921c756481d0e2125d8b895 - () https://git.kernel.org/stable/c/6e3ee990c90494561921c756481d0e2125d8b895 -
References () https://git.kernel.org/stable/c/d6f451f1f60c58d73038c7c3177066f8f084e2a2 - () https://git.kernel.org/stable/c/d6f451f1f60c58d73038c7c3177066f8f084e2a2 -

03 Jul 2024, 01:37

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: auditoría: corrige una posible desreferencia de puntero nulo en audit_filter_rules. Corrige una posible desreferencia de puntero nulo en audit_filter_rules. Error audit_filter_rules(): previamente asumimos que 'ctx' podría ser nulo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.4
CWE CWE-476

22 May 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-22 07:15

Updated : 2025-04-02 15:11


NVD link : CVE-2021-47464

Mitre link : CVE-2021-47464

CVE.ORG link : CVE-2021-47464


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference