Updated: 2026-02-08 02:42:56.748937
Description:
In the Linux kernel, the following vulnerability has been resolved: ACPI: CPPC: Avoid out of bounds access when parsing _CPC data If the NumEntries field in the _CPC return package is less than 2, do not attempt to access the "Revision" element of that package, because it may not be present then. BugLink: https://lore.kernel.org/lkml/20220322143534.GC32582@xsang-OptiPlex-9020/
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | HIGH | 7.1 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| CentOS 8.4 ELS | kernel | 4.18.0 | 7.1 | HIGH | Released | CLSA-2025:1763731262 | 2025-11-21 22:11:56 | Ignored due to low severity |
| CentOS 8.5 ELS | kernel | 4.18.0 | 7.1 | HIGH | Released | CLSA-2025:1763734783 | 2025-11-21 22:11:57 | Ignored due to low severity |
| CentOS Stream 8 ELS | kernel | 4.18.0 | 7.1 | HIGH | Already Fixed | 2025-12-03 20:06:07 | Ignored due to low severity | |
| Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 7.1 | HIGH | Already Fixed | 2025-10-30 14:39:52 | ||
| Ubuntu 16.04 ELS | linux | 4.4.0 | 7.1 | HIGH | Released | CLSA-2025:1763991095 | 2025-11-24 17:19:29 |