CVE-2021-47289

In the Linux kernel, the following vulnerability has been resolved: ACPI: fix NULL pointer dereference Commit 71f642833284 ("ACPI: utils: Fix reference counting in for_each_acpi_dev_match()") started doing "acpi_dev_put()" on a pointer that was possibly NULL. That fails miserably, because that helper inline function is not set up to handle that case. Just make acpi_dev_put() silently accept a NULL pointer, rather than calling down to put_device() with an invalid offset off that NULL pointer.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*

History

23 Dec 2024, 16:46

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/38f54217b423c0101d03a00feec6fb8ec608b12e - () https://git.kernel.org/stable/c/38f54217b423c0101d03a00feec6fb8ec608b12e - Patch
References () https://git.kernel.org/stable/c/cae3fa3d8165761f3000f523b11cfa1cd35206bc - () https://git.kernel.org/stable/c/cae3fa3d8165761f3000f523b11cfa1cd35206bc - Patch
References () https://git.kernel.org/stable/c/ccf23a0888077a25a0793a746c3941db2a7562e4 - () https://git.kernel.org/stable/c/ccf23a0888077a25a0793a746c3941db2a7562e4 - Patch
References () https://git.kernel.org/stable/c/fc68f42aa737dc15e7665a4101d4168aadb8e4c4 - () https://git.kernel.org/stable/c/fc68f42aa737dc15e7665a4101d4168aadb8e4c4 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE CWE-476

21 Nov 2024, 06:35

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: ACPI: corrige la desreferencia del puntero NULL. La confirmación 71f642833284 ("ACPI: utils: corrige el recuento de referencias en for_each_acpi_dev_match()") comenzó a hacer "acpi_dev_put()" en un puntero que posiblemente era NULL. Eso falla estrepitosamente, porque esa función auxiliar en línea no está configurada para manejar ese caso. Simplemente haga que acpi_dev_put() acepte silenciosamente un puntero NULL, en lugar de llamar a put_device() con un desplazamiento no válido de ese puntero NULL.
References () https://git.kernel.org/stable/c/38f54217b423c0101d03a00feec6fb8ec608b12e - () https://git.kernel.org/stable/c/38f54217b423c0101d03a00feec6fb8ec608b12e -
References () https://git.kernel.org/stable/c/cae3fa3d8165761f3000f523b11cfa1cd35206bc - () https://git.kernel.org/stable/c/cae3fa3d8165761f3000f523b11cfa1cd35206bc -
References () https://git.kernel.org/stable/c/ccf23a0888077a25a0793a746c3941db2a7562e4 - () https://git.kernel.org/stable/c/ccf23a0888077a25a0793a746c3941db2a7562e4 -
References () https://git.kernel.org/stable/c/fc68f42aa737dc15e7665a4101d4168aadb8e4c4 - () https://git.kernel.org/stable/c/fc68f42aa737dc15e7665a4101d4168aadb8e4c4 -

21 May 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 15:15

Updated : 2024-12-23 16:46


NVD link : CVE-2021-47289

Mitre link : CVE-2021-47289

CVE.ORG link : CVE-2021-47289


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference