CVE-2025-38344

5.5 MEDIUM

📋 TL;DR

This CVE describes a memory leak vulnerability in the Linux kernel's ACPI subsystem where 'Acpi-Parse' and 'Acpi-parse_ext' caches are not properly cleaned up during early abort scenarios. This affects systems using ACPI during boot, potentially leading to kernel memory exhaustion. The vulnerability impacts Linux systems with ACPI enabled.

💻 Affected Systems

Products:
  • Linux Kernel
Versions: Specific affected versions not explicitly stated in CVE, but references indicate fixes in stable kernel trees. Likely affects multiple kernel versions before fixes were applied.
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with ACPI enabled (most modern systems). Virtual machines and physical hardware both affected.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel memory exhaustion leading to system instability, crashes, or denial of service during boot process.

🟠

Likely Case

Minor memory leak during boot that may not cause immediate issues but contributes to memory fragmentation over time.

🟢

If Mitigated

No operational impact if system boots successfully; memory leak is contained to boot process.

🌐 Internet-Facing: LOW - This is a local kernel vulnerability requiring system access; not remotely exploitable.
🏢 Internal Only: MEDIUM - Could affect system stability during boot, potentially disrupting services on affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH - Requires triggering specific ACPI early abort conditions during boot.

This is a reliability/DoS vulnerability, not a privilege escalation or code execution flaw. Exploitation requires ability to influence ACPI initialization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple stable kernel commits referenced (e.g., 0a119fdaed67566aa3e0b5222dced4d08bbce463, 198c2dab022e5e94a99fff267b669d693bc7bb49)

Vendor Advisory: https://git.kernel.org/stable/c/0a119fdaed67566aa3e0b5222dced4d08bbce463

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing fixes. 2. Check kernel commit history for ACPI cache leak fixes. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable ACPI (Not Recommended)

linux

Add acpi=off to kernel boot parameters to disable ACPI subsystem entirely.

Edit /etc/default/grub and add 'acpi=off' to GRUB_CMDLINE_LINUX
Run 'update-grub' (or equivalent)
Reboot

🧯 If You Can't Patch

  • Monitor system memory usage during boot for unusual patterns
  • Ensure systems have adequate memory to handle potential leaks during boot process

🔍 How to Verify

Check if Vulnerable:

Check kernel boot logs for 'kmem_cache_destroy Acpi-Parse: Slab cache still has objects' or 'kmem_cache_destroy Acpi-parse_ext: Slab cache still has objects' messages.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the referenced fixes by checking commit history or kernel changelog.

📡 Detection & Monitoring

Log Indicators:

  • 'kmem_cache_destroy Acpi-Parse: Slab cache still has objects' in kernel logs
  • 'kmem_cache_destroy Acpi-parse_ext: Slab cache still has objects' in kernel logs
  • 'ACPI: Unable to start the ACPI Interpreter' followed by cache destruction errors

Network Indicators:

  • None - this is a local kernel issue

SIEM Query:

source="kernel" AND ("kmem_cache_destroy Acpi-Parse" OR "kmem_cache_destroy Acpi-parse_ext")

🔗 References

📤 Share & Export