CVE-2025-38344
BaseFortify
Publication date: 2025-07-10
Last updated on: 2025-12-16
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.11 (inc) to 5.15.186 (inc) |
| debian | debian_linux | 11.0 |
| linux | linux_kernel | 4.12.0-rc4-next-20170608 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's ACPI (Advanced Configuration and Power Interface) implementation. Specifically, it involves cache leaks in the ACPICA component during early abort cases. The issue arises because certain ACPI caches ('Acpi-Parse' and 'Acpi-parse_ext') are not properly released due to the use of the SLAB_NEVER_MERGE flag in the kernel's memory cache creation function, leading to memory not being freed as expected.
How can this vulnerability impact me? :
The memory leak caused by this vulnerability can lead to increased memory usage over time, potentially degrading system performance or causing resource exhaustion. This could affect system stability, especially on systems that frequently initialize or terminate ACPI components.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by examining the system boot logs for specific ACPI error messages indicating cache leaks. Look for log entries such as 'kmem_cache_destroy Acpi-State: Slab cache still has objects', 'kmem_cache_destroy Acpi-Parse: Slab cache still has objects', or 'kmem_cache_destroy Acpi-parse_ext: Slab cache still has objects'. You can use commands like 'dmesg | grep -i acpi' or 'journalctl -k | grep -i acpi' to search for these messages in the kernel logs.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the fix for this ACPI cache leak vulnerability. Since the issue is resolved in the ACPICA commit 8829e70e1360c81e7a5a901b5d4f48330e021ea5, applying the corresponding kernel patch or upgrading to a kernel version containing this fix is recommended. Additionally, monitoring system logs for the described ACPI errors can help identify if the vulnerability is present.