{"id":"CVE-2021-47464","details":"In the Linux kernel, the following vulnerability has been resolved:\n\naudit: fix possible null-pointer dereference in audit_filter_rules\n\nFix  possible null-pointer dereference in audit_filter_rules.\n\naudit_filter_rules() error: we previously assumed 'ctx' could be null","modified":"2026-03-13T05:18:10.053323Z","published":"2024-05-22T07:15:11.287Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2010-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2183-1","SUSE-SU-2024:2185-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1"],"references":[{"type":"FIX","url":"https://git.kernel.org/stable/c/d6f451f1f60c58d73038c7c3177066f8f084e2a2"},{"type":"FIX","url":"https://git.kernel.org/stable/c/16802fa4c33eb1a8efb23f1e93365190e4047d05"},{"type":"FIX","url":"https://git.kernel.org/stable/c/4e9e46a700201b4c85081fd478c99c692a9aaa0d"},{"type":"FIX","url":"https://git.kernel.org/stable/c/6e3ee990c90494561921c756481d0e2125d8b895"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-47464.json","unresolved_ranges":[{"events":[{"introduced":"5.3"},{"fixed":"5.4.156"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.76"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.14.15"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc4"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc5"}]},{"events":[{"introduced":"0"},{"last_affected":"5.15-rc6"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}