CVE-2025-38345
BaseFortify
Publication date: 2025-07-10
Last updated on: 2025-12-16
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.11 (inc) to 5.15.186 (inc) |
| debian | debian_linux | 11.0 |
| linux | kernel | 4.12.0-rc5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an ACPI operand cache memory leak in the Linux kernel's ACPICA component. It occurs when the kernel encounters a malicious ACPI table causing early termination of ACPI functions during boot. Due to a miscalculation in stack handling functions, the kernel leaks memory from the ACPI operand cache. This leak can expose kernel memory locations in stack dumps, potentially aiding attackers in bypassing kernel address space layout randomization (ASLR).
How can this vulnerability impact me? :
The vulnerability can lead to exposure of kernel memory addresses through stack dumps during boot. Malicious users could exploit this information to defeat kernel ASLR, which is a security mechanism designed to prevent certain types of attacks. This could increase the risk of privilege escalation or other kernel-level attacks.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by examining the system boot logs for specific ACPI error messages indicating an ACPI operand cache leak. Look for log entries similar to: 'kmem_cache_destroy Acpi-Operand: Slab cache still has objects' and other ACPI errors such as 'ACPI Error: Illegal I/O port address/length above 64K' or 'ACPI Exception: AE_LIMIT'. You can check the kernel boot log using commands like 'dmesg | grep -i acpi' or 'journalctl -k | grep -i acpi' to find these messages.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the Linux kernel to a version that includes the patch fixing the ACPI operand cache leak (post kernel version 4.9). Applying the patch that corrects the acpi_ds_obj_stack_pop_and_delete() function to properly manage the operand cache will prevent the memory leak and associated security risks. Until then, monitoring logs for the described ACPI errors and restricting access to the system to trusted users can reduce exploitation risk.