CVE-2017-11472
Description
The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel before 4.12 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
ACPI table handler in Linux kernel before 4.12 leaks operand cache, enabling local KASLR bypass via kernel address disclosure.
Vulnerability
The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c of the Linux kernel (before version 4.12) fails to flush the ACPI operand cache when terminating the ACPI namespace. This results in a kernel stack dump containing sensitive kernel memory addresses. To reach this code path, a local user must be able to load a crafted ACPI table, which requires the CAP_SYS_RAWIO capability or root privileges. Affected versions: Linux kernel before 4.12 (the issue is fixed in commit 3b2d69114fefa474fca542e51119036dceb4aa6f).
Exploitation
An attacker with local access and the ability to load ACPI tables (e.g., via acpi_load_table or by triggering a module-level ACPI code path) can supply a malicious ACPI table. The kernel, when processing the crafted table, triggers the vulnerable acpi_ns_terminate() path, which does not properly free the operand cache. The subsequent kernel stack dump (a kernel log message) will include residual kernel memory addresses from the operand cache, which are otherwise not accessible to userspace.
Impact
Successful exploitation allows a local attacker to obtain sensitive kernel memory addresses (information disclosure). This directly defeats the Kernel Address Space Layout Randomization (KASLR) protection mechanism (in kernels through 4.9), as the leaked addresses can be used to calculate the kernel base address, facilitating further exploitation such as privilege escalation. No arbitrary code execution or privilege escalation is directly achieved, but the attacker gains a critical information leak that weakens other kernel defenses.
Mitigation
The fix was applied in Linux kernel version 4.12 via commit 3b2d69114fefa474fca542e51119036dceb4aa6f [4]. Ubuntu and other distributions have backported the fix to their stable kernels; see Ubuntu Security Notices USN-3754-1 [1], USN-3619-2 [2], and USN-3619-1 [3] for details. Users should update to a patched kernel version. For systems that cannot be updated, restricting local access and disabling loading of arbitrary ACPI tables may reduce exposure, but the recommended mitigation is to apply the kernel update.
- USN-3754-1: Linux kernel vulnerabilities | Ubuntu security notices | Ubuntu
- USN-3619-2: Linux kernel (Xenial HWE) vulnerabilities | Ubuntu security notices | Ubuntu
- USN-3619-1: Linux kernel vulnerabilities | Ubuntu security notices | Ubuntu
- ACPICA: Namespace: fix operand cache leak · torvalds/linux@3b2d691
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
36- osv-coords35 versionspkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP3pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_14&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_4&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3
< 4.4.90-92.45.1+ 34 more
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.3
- (no CPE)range: < 4.4.92-6.18.3
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.88-18.1
- (no CPE)range: < 4.4.88-18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.88-18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.88-18.1
- (no CPE)range: < 1-2.4
- (no CPE)range: < 1-4.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdIssue TrackingPatchThird Party Advisory
- github.com/acpica/acpica/commit/a23325b2e583556eae88ed3f764e457786bf4df6nvdIssue TrackingPatchThird Party Advisory
- github.com/torvalds/linux/commit/3b2d69114fefa474fca542e51119036dceb4aa6fnvdIssue TrackingPatchThird Party Advisory
- usn.ubuntu.com/3619-1/nvd
- usn.ubuntu.com/3619-2/nvd
- usn.ubuntu.com/3754-1/nvd
News mentions
0No linked articles in our index yet.