CVE-2021-47464: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: audit: fix possible null-pointer dereference in audit_filter_rules Fix possible null-pointer dereference in audit_filter_rules. audit_filter_rules() error: we previously assumed 'ctx' could be null
AI Analysis
Technical Summary
CVE-2021-47464 is a high-severity vulnerability identified in the Linux kernel's audit subsystem, specifically within the audit_filter_rules function. The flaw is a possible null-pointer dereference caused by an incorrect assumption that the 'ctx' (context) pointer could never be null. This vulnerability falls under CWE-476 (NULL Pointer Dereference), which can lead to system crashes or denial of service (DoS) conditions when exploited. The audit subsystem is responsible for monitoring and logging security-relevant events on Linux systems, and a flaw here can impact system stability and security monitoring capabilities. The CVSS v3.1 score is 7.4, indicating a high severity level, with the vector AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. This means the attack vector requires local access (AV:L), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability could be leveraged by a local attacker to cause system crashes or potentially escalate privileges by disrupting audit functionality. The affected versions are identified by specific kernel commit hashes, indicating the flaw is present in certain Linux kernel builds prior to the patch. The vulnerability was published on May 22, 2024, and has been acknowledged by the Linux project with a fix applied to prevent the null-pointer dereference by properly handling the 'ctx' pointer in audit_filter_rules.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying heavily on Linux-based infrastructure for critical services, including servers, cloud environments, and embedded systems. The audit subsystem is crucial for compliance with regulations such as GDPR, NIS Directive, and other cybersecurity frameworks that mandate robust logging and monitoring. Exploitation could lead to denial of service, disrupting business operations and potentially causing loss of audit data integrity, which could hinder forensic investigations and compliance reporting. Given the high impact on confidentiality, integrity, and availability, attackers could leverage this flaw to disrupt security monitoring or cause system instability, affecting sectors like finance, healthcare, government, and critical infrastructure. The requirement for local access and high attack complexity somewhat limits remote exploitation but does not eliminate risk from insider threats or attackers who have gained initial footholds. The absence of known exploits in the wild reduces immediate urgency but does not preclude future exploitation attempts.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel versions to the fixed releases that address CVE-2021-47464. Since the vulnerability requires local access and high attack complexity, organizations should also strengthen internal access controls and monitoring to detect and prevent unauthorized local access. Implement strict user privilege management and employ kernel integrity monitoring tools to detect anomalous behavior related to the audit subsystem. Regularly audit and verify the integrity of audit logs to ensure they have not been tampered with. For environments where immediate patching is challenging, consider disabling or restricting audit subsystem features temporarily, if feasible, to reduce exposure. Additionally, organizations should enhance endpoint detection and response (EDR) capabilities to identify potential exploitation attempts and maintain robust incident response plans tailored to kernel-level vulnerabilities. Coordination with Linux distribution vendors for timely patch deployment and monitoring security advisories is essential.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium, Finland
CVE-2021-47464: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: audit: fix possible null-pointer dereference in audit_filter_rules Fix possible null-pointer dereference in audit_filter_rules. audit_filter_rules() error: we previously assumed 'ctx' could be null
AI-Powered Analysis
Technical Analysis
CVE-2021-47464 is a high-severity vulnerability identified in the Linux kernel's audit subsystem, specifically within the audit_filter_rules function. The flaw is a possible null-pointer dereference caused by an incorrect assumption that the 'ctx' (context) pointer could never be null. This vulnerability falls under CWE-476 (NULL Pointer Dereference), which can lead to system crashes or denial of service (DoS) conditions when exploited. The audit subsystem is responsible for monitoring and logging security-relevant events on Linux systems, and a flaw here can impact system stability and security monitoring capabilities. The CVSS v3.1 score is 7.4, indicating a high severity level, with the vector AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. This means the attack vector requires local access (AV:L), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impacts confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability could be leveraged by a local attacker to cause system crashes or potentially escalate privileges by disrupting audit functionality. The affected versions are identified by specific kernel commit hashes, indicating the flaw is present in certain Linux kernel builds prior to the patch. The vulnerability was published on May 22, 2024, and has been acknowledged by the Linux project with a fix applied to prevent the null-pointer dereference by properly handling the 'ctx' pointer in audit_filter_rules.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying heavily on Linux-based infrastructure for critical services, including servers, cloud environments, and embedded systems. The audit subsystem is crucial for compliance with regulations such as GDPR, NIS Directive, and other cybersecurity frameworks that mandate robust logging and monitoring. Exploitation could lead to denial of service, disrupting business operations and potentially causing loss of audit data integrity, which could hinder forensic investigations and compliance reporting. Given the high impact on confidentiality, integrity, and availability, attackers could leverage this flaw to disrupt security monitoring or cause system instability, affecting sectors like finance, healthcare, government, and critical infrastructure. The requirement for local access and high attack complexity somewhat limits remote exploitation but does not eliminate risk from insider threats or attackers who have gained initial footholds. The absence of known exploits in the wild reduces immediate urgency but does not preclude future exploitation attempts.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernel versions to the fixed releases that address CVE-2021-47464. Since the vulnerability requires local access and high attack complexity, organizations should also strengthen internal access controls and monitoring to detect and prevent unauthorized local access. Implement strict user privilege management and employ kernel integrity monitoring tools to detect anomalous behavior related to the audit subsystem. Regularly audit and verify the integrity of audit logs to ensure they have not been tampered with. For environments where immediate patching is challenging, consider disabling or restricting audit subsystem features temporarily, if feasible, to reduce exposure. Additionally, organizations should enhance endpoint detection and response (EDR) capabilities to identify potential exploitation attempts and maintain robust incident response plans tailored to kernel-level vulnerabilities. Coordination with Linux distribution vendors for timely patch deployment and monitoring security advisories is essential.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-22T06:20:56.198Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9833c4522896dcbe91f7
Added to database: 5/21/2025, 9:09:07 AM
Last enriched: 7/3/2025, 5:13:03 AM
Last updated: 7/31/2025, 8:18:22 AM
Views: 8
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.