Impact
This kernel bug introduces a use‑after‑free that occurs when the ACPI EC install handler fails on reduced‑hardware platforms. The freed EC context remains registered with ACPICA and later AML evaluations that read EC OpRegion fields call the stale handler, corrupting kernel memory. Based on the description, it is inferred that the resulting memory corruption could potentially be leveraged by a local adversary to influence kernel behaviour, possibly leading to privilege escalation or system instability. The weakness is a classic use‑after‑free, classified as CWE‑825.
Affected Systems
The flaw affects all Linux kernel versions that contain the unpatched ACPI EC driver code. It is relevant for systems with ACPI support for embedded controllers, such as battery, thermal, and backlight OpRegions, that also use reduced‑hardware EC configurations (where the EC GPE is negative). The vulnerability is present regardless of the distribution or vendor, as it is a kernel source code defect shipped with upstream. Anyone running an unpatched kernel that uses ACPI EC on a platform that defers the EC probe is potentially impacted.
Risk and Exploitability
The CVSS score of 7 indicates high severity. The EPSS score is reported as < 1%, which suggests a very low probability of exploitation, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Based on the description, the attack path appears to involve local, unprivileged sysfs access that triggers an ACPI read on an EC OpRegion. While the vulnerability could be leveraged for privilege escalation or system instability, its exploitation is more likely to cause memory corruption or kernel crashes rather than immediate remote code execution. Consequently, patching remains the most effective countermeasure.
OpenCVE Enrichment
Debian DLA
Debian DSA