We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38386

ACPICA: Refuse to evaluate a method if arguments are missing



Description

In the Linux kernel, the following vulnerability has been resolved: ACPICA: Refuse to evaluate a method if arguments are missing As reported in [1], a platform firmware update that increased the number of method parameters and forgot to update a least one of its callers, caused ACPICA to crash due to use-after-free. Since this a result of a clear AML issue that arguably cannot be fixed up by the interpreter (it cannot produce missing data out of thin air), address it by making ACPICA refuse to evaluate a method if the caller attempts to pass fewer arguments than expected to it.

Reserved 2025-04-16 | Published 2025-07-25 | Updated 2025-07-25 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before b49d224d1830c46e20adce2a239c454cdab426f1
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 2219e49857ffd6aea1b1ca5214d3270f84623a16
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before ab1e8491c19eb2ea0fda81ef28e841c7cb6399f5
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 4305d936abde795c2ef6ba916de8f00a50f64d2d
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before d547779e72cea9865b732cd45393c4cd02b3598e
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 18ff4ed6a33a7e3f2097710eacc96bea7696e803
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before c9e4da550ae196132b990bd77ed3d8f2d9747f87
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 6fcab2791543924d438e7fa49276d0998b0a069f
affected

Default status
affected

5.4.296
unaffected

5.10.240
unaffected

5.15.187
unaffected

6.1.144
unaffected

6.6.97
unaffected

6.12.37
unaffected

6.15.6
unaffected

6.16-rc3
unaffected

References

git.kernel.org/...c/b49d224d1830c46e20adce2a239c454cdab426f1

git.kernel.org/...c/2219e49857ffd6aea1b1ca5214d3270f84623a16

git.kernel.org/...c/ab1e8491c19eb2ea0fda81ef28e841c7cb6399f5

git.kernel.org/...c/4305d936abde795c2ef6ba916de8f00a50f64d2d

git.kernel.org/...c/d547779e72cea9865b732cd45393c4cd02b3598e

git.kernel.org/...c/18ff4ed6a33a7e3f2097710eacc96bea7696e803

git.kernel.org/...c/c9e4da550ae196132b990bd77ed3d8f2d9747f87

git.kernel.org/...c/6fcab2791543924d438e7fa49276d0998b0a069f

cve.org (CVE-2025-38386)

nvd.nist.gov (CVE-2025-38386)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38386

Support options

Helpdesk Chat, Email, Knowledgebase