### [CVE-2021-47464](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47464) ![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=bf361231c295%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=bf361231c295d92a28ca283ea713f56e93e55796%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue) ### Description In the Linux kernel, the following vulnerability has been resolved:audit: fix possible null-pointer dereference in audit_filter_rulesFix possible null-pointer dereference in audit_filter_rules.audit_filter_rules() error: we previously assumed 'ctx' could be null ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cve-scores