{"uuid": "0fd35141-6a2a-4ecc-8ac4-112490418424", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-47353", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14718", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2021-47353\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nudf: Fix NULL pointer dereference in udf_symlink function\n\nIn function udf_symlink, epos.bh is assigned with the value returned\nby udf_tgetblk. The function udf_tgetblk is defined in udf/misc.c\nand returns the value of sb_getblk function that could be NULL.\nThen, epos.bh is used without any check, causing a possible\nNULL pointer dereference when sb_getblk fails.\n\nThis fix adds a check to validate the value of epos.bh.\n\ud83d\udccf Published: 2024-05-21T14:35:57.122Z\n\ud83d\udccf Modified: 2025-05-04T07:09:12.716Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/2f3d9ddd32a28803baa547e6274983b67d5e287c\n2. https://git.kernel.org/stable/c/371566f63cbd0bb6fbb25b8fe9d5798268d35af9\n3. https://git.kernel.org/stable/c/baea588a42d675e35daeaddd10fbc9700550bc4d\n4. https://git.kernel.org/stable/c/3638705ecd5ad2785e996f820121c0ad15ce64b5\n5. https://git.kernel.org/stable/c/80d505aee6398cf8beb72475c7edcf1733c1c68b\n6. https://git.kernel.org/stable/c/21bf1414580c36ffc8d8de043beb3508cf812238\n7. https://git.kernel.org/stable/c/aebed6b19e51a34003d998da5ebb1dfdd2cb1d02\n8. https://git.kernel.org/stable/c/5150877e4d99f85057a458daac7cd7c01005d5c6\n9. https://git.kernel.org/stable/c/fa236c2b2d4436d9f19ee4e5d5924e90ffd7bb43", "creation_timestamp": "2025-05-04T07:17:52.000000Z"}