Unrated severityNVD Advisory· Published May 21, 2024· Updated Dec 18, 2025
udf: Fix NULL pointer dereference in udf_symlink function
CVE-2021-47353
Description
In the Linux kernel, the following vulnerability has been resolved:
udf: Fix NULL pointer dereference in udf_symlink function
In function udf_symlink, epos.bh is assigned with the value returned by udf_tgetblk. The function udf_tgetblk is defined in udf/misc.c and returns the value of sb_getblk function that could be NULL. Then, epos.bh is used without any check, causing a possible NULL pointer dereference when sb_getblk fails.
This fix adds a check to validate the value of epos.bh.
Affected products
103- osv-coords102 versionspkg:rpm/almalinux/bpftoolpkg:rpm/almalinux/kernelpkg:rpm/almalinux/kernel-abi-stablelistspkg:rpm/almalinux/kernel-corepkg:rpm/almalinux/kernel-cross-headerspkg:rpm/almalinux/kernel-debugpkg:rpm/almalinux/kernel-debug-corepkg:rpm/almalinux/kernel-debug-develpkg:rpm/almalinux/kernel-debug-modulespkg:rpm/almalinux/kernel-debug-modules-extrapkg:rpm/almalinux/kernel-develpkg:rpm/almalinux/kernel-docpkg:rpm/almalinux/kernel-headerspkg:rpm/almalinux/kernel-modulespkg:rpm/almalinux/kernel-modules-extrapkg:rpm/almalinux/kernel-rtpkg:rpm/almalinux/kernel-rt-corepkg:rpm/almalinux/kernel-rt-debugpkg:rpm/almalinux/kernel-rt-debug-corepkg:rpm/almalinux/kernel-rt-debug-develpkg:rpm/almalinux/kernel-rt-debug-kvmpkg:rpm/almalinux/kernel-rt-debug-modulespkg:rpm/almalinux/kernel-rt-debug-modules-extrapkg:rpm/almalinux/kernel-rt-develpkg:rpm/almalinux/kernel-rt-kvmpkg:rpm/almalinux/kernel-rt-modulespkg:rpm/almalinux/kernel-rt-modules-extrapkg:rpm/almalinux/kernel-toolspkg:rpm/almalinux/kernel-tools-libspkg:rpm/almalinux/kernel-tools-libs-develpkg:rpm/almalinux/kernel-zfcpdumppkg:rpm/almalinux/kernel-zfcpdump-corepkg:rpm/almalinux/kernel-zfcpdump-develpkg:rpm/almalinux/kernel-zfcpdump-modulespkg:rpm/almalinux/kernel-zfcpdump-modules-extrapkg:rpm/almalinux/perfpkg:rpm/almalinux/python3-perfpkg:rpm/suse/kernel-64kb&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-default-base&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP5pkg:rpm/suse/kernel-docs&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_45&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/kernel-preempt&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-preempt&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP5pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_57&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5
< 4.18.0-553.8.1.el8_10+ 101 more
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.rt7.349.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 4.18.0-553.8.1.el8_10
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 5.3.18-150300.59.164.1.150300.18.96.1
- (no CPE)range: < 5.3.18-150300.59.164.1.150300.18.96.1
- (no CPE)range: < 5.3.18-150300.59.164.1.150300.18.96.1
- (no CPE)range: < 5.3.18-150300.59.164.1.150300.18.96.1
- (no CPE)range: < 5.3.18-150300.59.164.1.150300.18.96.1
- (no CPE)range: < 5.3.18-150300.59.164.1.150300.18.96.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 1-150300.7.3.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 5.3.18-150300.172.1
- (no CPE)range: < 5.3.18-150300.172.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.172.1
- (no CPE)range: < 5.3.18-150300.172.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 4.12.14-16.188.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-122.219.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 4.12.14-10.188.1
- (no CPE)range: < 5.3.18-150300.59.164.1
- (no CPE)range: < 1-8.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- git.kernel.org/stable/c/21bf1414580c36ffc8d8de043beb3508cf812238mitre
- git.kernel.org/stable/c/2f3d9ddd32a28803baa547e6274983b67d5e287cmitre
- git.kernel.org/stable/c/3638705ecd5ad2785e996f820121c0ad15ce64b5mitre
- git.kernel.org/stable/c/371566f63cbd0bb6fbb25b8fe9d5798268d35af9mitre
- git.kernel.org/stable/c/5150877e4d99f85057a458daac7cd7c01005d5c6mitre
- git.kernel.org/stable/c/80d505aee6398cf8beb72475c7edcf1733c1c68bmitre
- git.kernel.org/stable/c/aebed6b19e51a34003d998da5ebb1dfdd2cb1d02mitre
- git.kernel.org/stable/c/baea588a42d675e35daeaddd10fbc9700550bc4dmitre
- git.kernel.org/stable/c/fa236c2b2d4436d9f19ee4e5d5924e90ffd7bb43mitre
News mentions
0No linked articles in our index yet.