发布时间: 2025年8月8日
修改时间: 2025年8月29日
In the Linux kernel, the following vulnerability has been resolved: ACPICA: Refuse to evaluate a method if arguments are missing As reported in [1], a platform firmware update that increased the number of method parameters and forgot to update a least one of its callers, caused ACPICA to crash due to use-after-free. Since this a result of a clear AML issue that arguably cannot be fixed up by the interpreter (it cannot produce missing data out of thin air), address it by making ACPICA refuse to evaluate a method if the caller attempts to pass fewer arguments than expected to it.
NVD | openEuler | |
---|---|---|
Confidentiality | High | |
Attack Vector | Adjacent | |
CVSS评分 | N/A | 8.0 |
Attack Complexity | Low | |
Privileges Required | Low | |
Scope | Unchanged | |
Integrity | High | |
User Interaction | None | |
Availability | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2025-2878 | kernel security update | 2025年9月15日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-5A | kernel | Fixed |
V6 | kernel | Fixed |
KY3.5.3 | kernel | Fixed |
KY3.5.2 | kernel | Fixed |