CVE-2021-47289: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: ACPI: fix NULL pointer dereference Commit 71f642833284 ("ACPI: utils: Fix reference counting in for_each_acpi_dev_match()") started doing "acpi_dev_put()" on a pointer that was possibly NULL. That fails miserably, because that helper inline function is not set up to handle that case. Just make acpi_dev_put() silently accept a NULL pointer, rather than calling down to put_device() with an invalid offset off that NULL pointer.
AI Analysis
Technical Summary
CVE-2021-47289 is a vulnerability identified in the Linux kernel's ACPI (Advanced Configuration and Power Interface) subsystem. The issue arises from improper handling of NULL pointers in the function acpi_dev_put(), which is called during reference counting operations in for_each_acpi_dev_match(). Specifically, a commit (71f642833284) introduced a scenario where acpi_dev_put() could be called with a NULL pointer. The function was not originally designed to handle NULL pointers, leading to a NULL pointer dereference when put_device() is invoked with an invalid offset derived from the NULL pointer. This results in a kernel crash (denial of service) due to the kernel's inability to safely manage the NULL pointer. The fix implemented makes acpi_dev_put() silently accept NULL pointers without further dereferencing, preventing the kernel panic. The vulnerability affects Linux kernel versions prior to the patch and is related to internal kernel reference counting and device management in the ACPI subsystem. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
The primary impact of CVE-2021-47289 is a potential denial of service (DoS) condition caused by a kernel panic triggered by a NULL pointer dereference. For European organizations running Linux-based systems, especially those using ACPI for power management on laptops, servers, or embedded devices, this vulnerability could lead to unexpected system crashes. This can disrupt critical services, cause data loss due to abrupt shutdowns, and reduce system availability. While the vulnerability does not appear to allow privilege escalation or remote code execution, the DoS impact can be significant in environments requiring high availability, such as financial institutions, healthcare providers, and industrial control systems prevalent in Europe. Since the vulnerability is in the kernel, exploitation could affect any user or process triggering the vulnerable code path, potentially impacting multi-user systems and cloud environments. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or targeted triggering of the flaw.
Mitigation Recommendations
To mitigate CVE-2021-47289, European organizations should prioritize applying the official Linux kernel patches that address the NULL pointer dereference in the ACPI subsystem. Kernel updates should be tested and deployed promptly, especially on systems where ACPI is actively used. Organizations should audit their Linux kernel versions and ensure they are running a version that includes the fix. For environments where immediate patching is challenging, consider implementing kernel-level monitoring to detect and alert on kernel panics or crashes related to ACPI operations. Additionally, restricting untrusted user access and minimizing the attack surface by disabling unnecessary ACPI features or modules where feasible can reduce the likelihood of triggering the vulnerability. System administrators should also maintain robust backup and recovery procedures to mitigate the impact of unexpected system crashes. Finally, monitoring vendor advisories and Linux kernel mailing lists for any emerging exploit information is recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2021-47289: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: ACPI: fix NULL pointer dereference Commit 71f642833284 ("ACPI: utils: Fix reference counting in for_each_acpi_dev_match()") started doing "acpi_dev_put()" on a pointer that was possibly NULL. That fails miserably, because that helper inline function is not set up to handle that case. Just make acpi_dev_put() silently accept a NULL pointer, rather than calling down to put_device() with an invalid offset off that NULL pointer.
AI-Powered Analysis
Technical Analysis
CVE-2021-47289 is a vulnerability identified in the Linux kernel's ACPI (Advanced Configuration and Power Interface) subsystem. The issue arises from improper handling of NULL pointers in the function acpi_dev_put(), which is called during reference counting operations in for_each_acpi_dev_match(). Specifically, a commit (71f642833284) introduced a scenario where acpi_dev_put() could be called with a NULL pointer. The function was not originally designed to handle NULL pointers, leading to a NULL pointer dereference when put_device() is invoked with an invalid offset derived from the NULL pointer. This results in a kernel crash (denial of service) due to the kernel's inability to safely manage the NULL pointer. The fix implemented makes acpi_dev_put() silently accept NULL pointers without further dereferencing, preventing the kernel panic. The vulnerability affects Linux kernel versions prior to the patch and is related to internal kernel reference counting and device management in the ACPI subsystem. There are no known exploits in the wild at the time of publication, and no CVSS score has been assigned yet.
Potential Impact
The primary impact of CVE-2021-47289 is a potential denial of service (DoS) condition caused by a kernel panic triggered by a NULL pointer dereference. For European organizations running Linux-based systems, especially those using ACPI for power management on laptops, servers, or embedded devices, this vulnerability could lead to unexpected system crashes. This can disrupt critical services, cause data loss due to abrupt shutdowns, and reduce system availability. While the vulnerability does not appear to allow privilege escalation or remote code execution, the DoS impact can be significant in environments requiring high availability, such as financial institutions, healthcare providers, and industrial control systems prevalent in Europe. Since the vulnerability is in the kernel, exploitation could affect any user or process triggering the vulnerable code path, potentially impacting multi-user systems and cloud environments. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or targeted triggering of the flaw.
Mitigation Recommendations
To mitigate CVE-2021-47289, European organizations should prioritize applying the official Linux kernel patches that address the NULL pointer dereference in the ACPI subsystem. Kernel updates should be tested and deployed promptly, especially on systems where ACPI is actively used. Organizations should audit their Linux kernel versions and ensure they are running a version that includes the fix. For environments where immediate patching is challenging, consider implementing kernel-level monitoring to detect and alert on kernel panics or crashes related to ACPI operations. Additionally, restricting untrusted user access and minimizing the attack surface by disabling unnecessary ACPI features or modules where feasible can reduce the likelihood of triggering the vulnerability. System administrators should also maintain robust backup and recovery procedures to mitigate the impact of unexpected system crashes. Finally, monitoring vendor advisories and Linux kernel mailing lists for any emerging exploit information is recommended.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-21T13:27:52.129Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9835c4522896dcbea30c
Added to database: 5/21/2025, 9:09:09 AM
Last enriched: 6/26/2025, 11:21:26 AM
Last updated: 7/29/2025, 3:12:03 PM
Views: 9
Related Threats
CVE-2025-9002: SQL Injection in Surbowl dormitory-management-php
MediumCVE-2025-9001: Stack-based Buffer Overflow in LemonOS
MediumCVE-2025-8867: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in iqonicdesign Graphina – Elementor Charts and Graphs
MediumCVE-2025-8680: CWE-918 Server-Side Request Forgery (SSRF) in bplugins B Slider- Gutenberg Slider Block for WP
MediumCVE-2025-8676: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in bplugins B Slider- Gutenberg Slider Block for WP
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.