๐Ÿ” CVE Alert

CVE-2025-38386

UNKNOWN 0.0

ACPICA: Refuse to evaluate a method if arguments are missing

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ACPICA: Refuse to evaluate a method if arguments are missing As reported in [1], a platform firmware update that increased the number of method parameters and forgot to update a least one of its callers, caused ACPICA to crash due to use-after-free. Since this a result of a clear AML issue that arguably cannot be fixed up by the interpreter (it cannot produce missing data out of thin air), address it by making ACPICA refuse to evaluate a method if the caller attempts to pass fewer arguments than expected to it.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 25, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < b49d224d1830c46e20adce2a239c454cdab426f1 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 2219e49857ffd6aea1b1ca5214d3270f84623a16 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < ab1e8491c19eb2ea0fda81ef28e841c7cb6399f5 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 4305d936abde795c2ef6ba916de8f00a50f64d2d 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < d547779e72cea9865b732cd45393c4cd02b3598e 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 18ff4ed6a33a7e3f2097710eacc96bea7696e803 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < c9e4da550ae196132b990bd77ed3d8f2d9747f87 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 6fcab2791543924d438e7fa49276d0998b0a069f
Linux / Linux
2.6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b49d224d1830c46e20adce2a239c454cdab426f1 git.kernel.org: https://git.kernel.org/stable/c/2219e49857ffd6aea1b1ca5214d3270f84623a16 git.kernel.org: https://git.kernel.org/stable/c/ab1e8491c19eb2ea0fda81ef28e841c7cb6399f5 git.kernel.org: https://git.kernel.org/stable/c/4305d936abde795c2ef6ba916de8f00a50f64d2d git.kernel.org: https://git.kernel.org/stable/c/d547779e72cea9865b732cd45393c4cd02b3598e git.kernel.org: https://git.kernel.org/stable/c/18ff4ed6a33a7e3f2097710eacc96bea7696e803 git.kernel.org: https://git.kernel.org/stable/c/c9e4da550ae196132b990bd77ed3d8f2d9747f87 git.kernel.org: https://git.kernel.org/stable/c/6fcab2791543924d438e7fa49276d0998b0a069f lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html