Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      This week in AI dev tools: Gemini API Batch Mode, Amazon SageMaker AI updates, and more (July 11, 2025)

      July 11, 2025

      JFrog finds MCP-related vulnerability, highlighting need for stronger focus on security in MCP ecosystem

      July 11, 2025

      8 Key Questions Every CEO Should Ask Before Hiring a Node.js Development Company in 2025

      July 11, 2025

      Vibe Loop: AI-native reliability engineering for the real world

      July 10, 2025

      One of Atlus’ best Xbox JRPGs that puts modern Final Fantasy games to shame is now on a 45% discount — This is your last chance to seize it as the Amazon Day Prime closes today

      July 11, 2025

      Don’t waste the LAST 24 hours of Amazon Prime Day sales buying a MacBook — buy this much better Windows laptop instead!

      July 11, 2025

      This fantastic Xbox remake of a classic Atlus JRPG we gave a perfect review score to is now 49% cheaper — Don’t miss the deadline for this Amazon Prime Day deal, which ends today

      July 11, 2025

      HP’s discount on one of the most powerful gaming laptops on the planet is absolutely UNBEATABLE — but you only have a few hours to get one!

      July 11, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 11, 2025
      Recent

      The details of TC39’s last meeting

      July 11, 2025

      Francisco Bergeret Paves the Way Through Strong Leadership at Perficient

      July 11, 2025

      Intelligent Automation in the Healthcare Sector with n8n, OpenAI, and Pinecone

      July 11, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      One of Atlus’ best Xbox JRPGs that puts modern Final Fantasy games to shame is now on a 45% discount — This is your last chance to seize it as the Amazon Day Prime closes today

      July 11, 2025
      Recent

      One of Atlus’ best Xbox JRPGs that puts modern Final Fantasy games to shame is now on a 45% discount — This is your last chance to seize it as the Amazon Day Prime closes today

      July 11, 2025

      Don’t waste the LAST 24 hours of Amazon Prime Day sales buying a MacBook — buy this much better Windows laptop instead!

      July 11, 2025

      This fantastic Xbox remake of a classic Atlus JRPG we gave a perfect review score to is now 49% cheaper — Don’t miss the deadline for this Amazon Prime Day deal, which ends today

      July 11, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-38344 – Intel ACPI Cache Leak

    CVE-2025-38344 – Intel ACPI Cache Leak

    July 10, 2025

    CVE ID : CVE-2025-38344

    Published : July 10, 2025, 9:15 a.m. | 4 hours, 51 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    ACPICA: fix acpi parse and parseext cache leaks

    ACPICA commit 8829e70e1360c81e7a5a901b5d4f48330e021ea5

    I’m Seunghun Han, and I work for National Security Research Institute of
    South Korea.

    I have been doing a research on ACPI and found an ACPI cache leak in ACPI
    early abort cases.

    Boot log of ACPI cache leak is as follows:
    [ 0.352414] ACPI: Added _OSI(Module Device)
    [ 0.353182] ACPI: Added _OSI(Processor Device)
    [ 0.353182] ACPI: Added _OSI(3.0 _SCP Extensions)
    [ 0.353182] ACPI: Added _OSI(Processor Aggregator Device)
    [ 0.356028] ACPI: Unable to start the ACPI Interpreter
    [ 0.356799] ACPI Error: Could not remove SCI handler (20170303/evmisc-281)
    [ 0.360215] kmem_cache_destroy Acpi-State: Slab cache still has objects
    [ 0.360648] CPU: 0 PID: 1 Comm: swapper/0 Tainted: G W
    4.12.0-rc4-next-20170608+ #10
    [ 0.361273] Hardware name: innotek gmb_h virtual_box/virtual_box, BIOS
    virtual_box 12/01/2006
    [ 0.361873] Call Trace:
    [ 0.362243] ? dump_stack+0x5c/0x81
    [ 0.362591] ? kmem_cache_destroy+0x1aa/0x1c0
    [ 0.362944] ? acpi_sleep_proc_init+0x27/0x27
    [ 0.363296] ? acpi_os_delete_cache+0xa/0x10
    [ 0.363646] ? acpi_ut_delete_caches+0x6d/0x7b
    [ 0.364000] ? acpi_terminate+0xa/0x14
    [ 0.364000] ? acpi_init+0x2af/0x34f
    [ 0.364000] ? __class_create+0x4c/0x80
    [ 0.364000] ? video_setup+0x7f/0x7f
    [ 0.364000] ? acpi_sleep_proc_init+0x27/0x27
    [ 0.364000] ? do_one_initcall+0x4e/0x1a0
    [ 0.364000] ? kernel_init_freeable+0x189/0x20a
    [ 0.364000] ? rest_init+0xc0/0xc0
    [ 0.364000] ? kernel_init+0xa/0x100
    [ 0.364000] ? ret_from_fork+0x25/0x30

    I analyzed this memory leak in detail. I found that “Acpi-State” cache and
    “Acpi-Parse” cache were merged because the size of cache objects was same
    slab cache size.

    I finally found “Acpi-Parse” cache and “Acpi-parse_ext” cache were leaked
    using SLAB_NEVER_MERGE flag in kmem_cache_create() function.

    Real ACPI cache leak point is as follows:
    [ 0.360101] ACPI: Added _OSI(Module Device)
    [ 0.360101] ACPI: Added _OSI(Processor Device)
    [ 0.360101] ACPI: Added _OSI(3.0 _SCP Extensions)
    [ 0.361043] ACPI: Added _OSI(Processor Aggregator Device)
    [ 0.364016] ACPI: Unable to start the ACPI Interpreter
    [ 0.365061] ACPI Error: Could not remove SCI handler (20170303/evmisc-281)
    [ 0.368174] kmem_cache_destroy Acpi-Parse: Slab cache still has objects
    [ 0.369332] CPU: 1 PID: 1 Comm: swapper/0 Tainted: G W
    4.12.0-rc4-next-20170608+ #8
    [ 0.371256] Hardware name: innotek gmb_h virtual_box/virtual_box, BIOS
    virtual_box 12/01/2006
    [ 0.372000] Call Trace:
    [ 0.372000] ? dump_stack+0x5c/0x81
    [ 0.372000] ? kmem_cache_destroy+0x1aa/0x1c0
    [ 0.372000] ? acpi_sleep_proc_init+0x27/0x27
    [ 0.372000] ? acpi_os_delete_cache+0xa/0x10
    [ 0.372000] ? acpi_ut_delete_caches+0x56/0x7b
    [ 0.372000] ? acpi_terminate+0xa/0x14
    [ 0.372000] ? acpi_init+0x2af/0x34f
    [ 0.372000] ? __class_create+0x4c/0x80
    [ 0.372000] ? video_setup+0x7f/0x7f
    [ 0.372000] ? acpi_sleep_proc_init+0x27/0x27
    [ 0.372000] ? do_one_initcall+0x4e/0x1a0
    [ 0.372000] ? kernel_init_freeable+0x189/0x20a
    [ 0.372000] ? rest_init+0xc0/0xc0
    [ 0.372000] ? kernel_init+0xa/0x100
    [ 0.372000] ? ret_from_fork+0x25/0x30
    [ 0.388039] kmem_cache_destroy Acpi-parse_ext: Slab cache still has objects
    [ 0.389063] CPU: 1 PID: 1 Comm: swapper/0 Tainted: G W
    4.12.0-rc4-next-20170608+ #8
    [ 0.390557] Hardware name: innotek gmb_h virtual_box/virtual_box, BIOS
    virtual_box 12/01/2006
    [ 0.392000] Call Trace:
    [ 0.392000] ? dump_stack+0x5c/0x81
    [ 0.392000] ? kmem_cache_destroy+0x1aa/0x1c0
    [ 0.392000] ? acpi_sleep_proc_init+0x27/0x27
    [ 0.392000] ? acpi_os_delete_cache+0xa/0x10
    [ 0.392000] ? acpi_ut_delete_caches+0x6d/0x7b
    [ 0.392000] ? acpi_terminate+0xa/0x14
    [ 0.392000] ? acpi_init+0x2af/0x3
    —truncated—

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-38346 – Linux kernel ftrace UAF Vulnerability
    Next Article CVE-2025-38343 – “TP-Link MT76 WiFi Driver Multicast Broadcast RA Fragmentation Vulnerability”

    Related Posts

    Development

    Critical Vulnerability in Anthropic’s MCP Exposes Developer Machines to Remote Exploits

    July 11, 2025
    Development

    Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials

    July 11, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-47726 – Delta Electronics CNCSoft Remote Code Execution Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Firefox 137 Released with Address Bar Revamp & Tab Groups

    Linux

    CVE-2025-6200 – GeoDirectory Stored Cross-Site Scripting Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Microsoft aims to be “carbon negative” by 2030, with 3 million carbon removal credits in its backyard of Washington

    News & Updates

    Highlights

    Playwright Fixtures in Action : Create Reusable and Maintainable Tests

    May 21, 2025

    Setting up and tearing down test environments can be a repetitive and error-prone process in end-to-end testing. This is especially true when dealing with complex workflows or multiple test configurations. Enter Playwright Fixtures a built-in feature of Playwright Test that allows testers to define modular, reusable, and maintainable setup and teardown logic. Fixtures streamline your
    The post Playwright Fixtures in Action : Create Reusable and Maintainable Tests appeared first on Codoid.

    CVE-2025-5080 – Tenda FH451 Stack-Based Buffer Overflow

    May 22, 2025

    AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar

    June 12, 2025

    Hacker selling critical Roundcube webmail exploit as tech info disclosed

    June 5, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.