CVE-2025-38345

In the Linux kernel, the following vulnerability has been resolved: ACPICA: fix acpi operand cache leak in dswstate.c ACPICA commit 987a3b5cf7175916e2a4b6ea5b8e70f830dfe732 I found an ACPI cache leak in ACPI early termination and boot continuing case. When early termination occurs due to malicious ACPI table, Linux kernel terminates ACPI function and continues to boot process. While kernel terminates ACPI function, kmem_cache_destroy() reports Acpi-Operand cache leak. Boot log of ACPI operand cache leak is as follows: >[ 0.585957] ACPI: Added _OSI(Module Device) >[ 0.587218] ACPI: Added _OSI(Processor Device) >[ 0.588530] ACPI: Added _OSI(3.0 _SCP Extensions) >[ 0.589790] ACPI: Added _OSI(Processor Aggregator Device) >[ 0.591534] ACPI Error: Illegal I/O port address/length above 64K: C806E00000004002/0x2 (20170303/hwvalid-155) >[ 0.594351] ACPI Exception: AE_LIMIT, Unable to initialize fixed events (20170303/evevent-88) >[ 0.597858] ACPI: Unable to start the ACPI Interpreter >[ 0.599162] ACPI Error: Could not remove SCI handler (20170303/evmisc-281) >[ 0.601836] kmem_cache_destroy Acpi-Operand: Slab cache still has objects >[ 0.603556] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 4.12.0-rc5 #26 >[ 0.605159] Hardware name: innotek gmb_h virtual_box/virtual_box, BIOS virtual_box 12/01/2006 >[ 0.609177] Call Trace: >[ 0.610063] ? dump_stack+0x5c/0x81 >[ 0.611118] ? kmem_cache_destroy+0x1aa/0x1c0 >[ 0.612632] ? acpi_sleep_proc_init+0x27/0x27 >[ 0.613906] ? acpi_os_delete_cache+0xa/0x10 >[ 0.617986] ? acpi_ut_delete_caches+0x3f/0x7b >[ 0.619293] ? acpi_terminate+0xa/0x14 >[ 0.620394] ? acpi_init+0x2af/0x34f >[ 0.621616] ? __class_create+0x4c/0x80 >[ 0.623412] ? video_setup+0x7f/0x7f >[ 0.624585] ? acpi_sleep_proc_init+0x27/0x27 >[ 0.625861] ? do_one_initcall+0x4e/0x1a0 >[ 0.627513] ? kernel_init_freeable+0x19e/0x21f >[ 0.628972] ? rest_init+0x80/0x80 >[ 0.630043] ? kernel_init+0xa/0x100 >[ 0.631084] ? ret_from_fork+0x25/0x30 >[ 0.633343] vgaarb: loaded >[ 0.635036] EDAC MC: Ver: 3.0.0 >[ 0.638601] PCI: Probing PCI hardware >[ 0.639833] PCI host bridge to bus 0000:00 >[ 0.641031] pci_bus 0000:00: root bus resource [io 0x0000-0xffff] > ... Continue to boot and log is omitted ... I analyzed this memory leak in detail and found acpi_ds_obj_stack_pop_and_ delete() function miscalculated the top of the stack. acpi_ds_obj_stack_push() function uses walk_state->operand_index for start position of the top, but acpi_ds_obj_stack_pop_and_delete() function considers index 0 for it. Therefore, this causes acpi operand memory leak. This cache leak causes a security threat because an old kernel (<= 4.9) shows memory locations of kernel functions in stack dump. Some malicious users could use this information to neutralize kernel ASLR. I made a patch to fix ACPI operand cache leak.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

16 Dec 2025, 17:46

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-401
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/156fd20a41e776bbf334bd5e45c4f78dfc90ce1c - () https://git.kernel.org/stable/c/156fd20a41e776bbf334bd5e45c4f78dfc90ce1c - Patch
References () https://git.kernel.org/stable/c/1c0d9115a001979cb446ba5e8331dd1d29a10bbf - () https://git.kernel.org/stable/c/1c0d9115a001979cb446ba5e8331dd1d29a10bbf - Patch
References () https://git.kernel.org/stable/c/4fa430a8bca708c7776f6b9d001257f48b19a5b7 - () https://git.kernel.org/stable/c/4fa430a8bca708c7776f6b9d001257f48b19a5b7 - Patch
References () https://git.kernel.org/stable/c/5a68893b594ee6ce0efce5f74c07e64e9dd0c2c4 - () https://git.kernel.org/stable/c/5a68893b594ee6ce0efce5f74c07e64e9dd0c2c4 - Patch
References () https://git.kernel.org/stable/c/64c4bcf0308dd1d752ef31d560040b8725e29984 - () https://git.kernel.org/stable/c/64c4bcf0308dd1d752ef31d560040b8725e29984 - Patch
References () https://git.kernel.org/stable/c/755a8006b76792922ff7b1c9674d8897a476b5d7 - () https://git.kernel.org/stable/c/755a8006b76792922ff7b1c9674d8897a476b5d7 - Patch
References () https://git.kernel.org/stable/c/76d37168155880f2b04a0aad92ceb0f9d799950e - () https://git.kernel.org/stable/c/76d37168155880f2b04a0aad92ceb0f9d799950e - Patch
References () https://git.kernel.org/stable/c/e0783910ca4368b01466bc8dcdcc13c3e0b7db53 - () https://git.kernel.org/stable/c/e0783910ca4368b01466bc8dcdcc13c3e0b7db53 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory

03 Nov 2025, 18:16

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ACPICA: corrección de fuga de caché de operandos de ACPI en dswstate.c, confirmación de ACPICA 987a3b5cf7175916e2a4b6ea5b8e70f830dfe732. Se detectó una fuga de caché de ACPI en el caso de terminación anticipada de ACPI y continuación del arranque. Cuando se produce una terminación anticipada debido a una tabla ACPI maliciosa, el kernel de Linux finaliza la función ACPI y continúa el proceso de arranque. Mientras el kernel finaliza la función ACPI, kmem_cache_destroy() informa de una fuga de caché de operandos de ACPI. El registro de arranque de la fuga de caché de operandos de ACPI es el siguiente: &gt;[ 0.585957] ACPI: Added _OSI(Module Device) &gt;[ 0.587218] ACPI: Added _OSI(Processor Device) &gt;[ 0.588530] ACPI: Added _OSI(3.0 _SCP Extensions) &gt;[ 0.589790] ACPI: Added _OSI(Processor Aggregator Device) &gt;[ 0.591534] ACPI Error: Illegal I/O port address/length above 64K: C806E00000004002/0x2 (20170303/hwvalid-155) &gt;[ 0.594351] ACPI Exception: AE_LIMIT, Unable to initialize fixed events (20170303/evevent-88) &gt;[ 0.597858] ACPI: Unable to start the ACPI Interpreter &gt;[ 0.599162] ACPI Error: Could not remove SCI handler (20170303/evmisc-281) &gt;[ 0.601836] kmem_cache_destroy Acpi-Operand: Slab cache still has objects &gt;[ 0.603556] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 4.12.0-rc5 #26 &gt;[ 0.605159] Hardware name: innotek gmb_h virtual_box/virtual_box, BIOS virtual_box 12/01/2006 &gt;[ 0.609177] Call Trace: &gt;[ 0.610063] ? dump_stack+0x5c/0x81 &gt;[ 0.611118] ? kmem_cache_destroy+0x1aa/0x1c0 &gt;[ 0.612632] ? acpi_sleep_proc_init+0x27/0x27 &gt;[ 0.613906] ? acpi_os_delete_cache+0xa/0x10 &gt;[ 0.617986] ? acpi_ut_delete_caches+0x3f/0x7b &gt;[ 0.619293] ? acpi_terminate+0xa/0x14 &gt;[ 0.620394] ? acpi_init+0x2af/0x34f &gt;[ 0.621616] ? __class_create+0x4c/0x80 &gt;[ 0.623412] ? video_setup+0x7f/0x7f &gt;[ 0.624585] ? acpi_sleep_proc_init+0x27/0x27 &gt;[ 0.625861] ? do_one_initcall+0x4e/0x1a0 &gt;[ 0.627513] ? kernel_init_freeable+0x19e/0x21f &gt;[ 0.628972] ? rest_init+0x80/0x80 &gt;[ 0.630043] ? kernel_init+0xa/0x100 &gt;[ 0.631084] ? ret_from_fork+0x25/0x30 &gt;[ 0.633343] vgaarb: loaded &gt;[ 0.635036] EDAC MC: Ver: 3.0.0 &gt;[ 0.638601] PCI: Probing PCI hardware &gt;[ 0.639833] PCI host bridge to bus 0000:00 &gt;[ 0.641031] pci_bus 0000:00: root bus resource [io 0x0000-0xffff] &gt; ... Continuar con el arranque y se omite el registro ... Analicé esta pérdida de memoria en detalle y encontré que la función acpi_ds_obj_stack_pop_and_delete() calculó mal la parte superior de la pila. La función acpi_ds_obj_stack_push() usa walk_state-&gt;operand_index para la posición inicial del top, pero la función acpi_ds_obj_stack_pop_and_delete() considera el índice 0. Por lo tanto, esto provoca una fuga de memoria de operandos de ACPI. Esta fuga de caché representa una amenaza para la seguridad, ya que un kernel antiguo (&lt;= 4.9) muestra las ubicaciones de memoria de las funciones del kernel en el volcado de pila. Algunos usuarios maliciosos podrían usar esta información para neutralizar la ASLR del kernel. Creé un parche para corregir la fuga de caché de operandos de ACPI.
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

10 Jul 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-10 09:15

Updated : 2025-12-16 17:46


NVD link : CVE-2025-38345

Mitre link : CVE-2025-38345

CVE.ORG link : CVE-2025-38345


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime