Description
In the Linux kernel, the following vulnerability has been resolved:

ACPI: processor: Fix previous acpi_processor_errata_piix4() fix

After commi f132e089fe89 ("ACPI: processor: Fix NULL-pointer dereference
in acpi_processor_errata_piix4()"), device pointers may be dereferenced
after dropping references to the device objects pointed to by them,
which may cause a use-after-free to occur.

Moreover, debug messages about enabling the errata may be printed
if the errata flags corresponding to them are unset.

Address all of these issues by moving message printing to the points
in the code where the errata flags are set.
Published: 2026-04-03
Score: n/a
EPSS: n/a
KEV: No
Impact: Use-after-free in kernel ACPI processor code causing potential memory corruption
Action: Immediate Patch
AI Analysis

Impact

A flaw in the Linux kernel's ACPI processor handling allows device pointers to be dereferenced after the kernel has released the reference to the underlying device object. This creates a use‑after‑free condition that can corrupt kernel memory, potentially allowing an attacker with sufficient privileges to execute arbitrary code or cause a system crash.

Affected Systems

All Linux kernel implementations that contain the ACPI processor errata logic before the patch was applied are affected. This includes common distribution kernel packages—such as Ubuntu, Debian, Red‑Hat, CentOS, Fedora, and others—up to the point where the kernel has incorporated the upstream fix for acpi_processor_errata_piix4. The exact kernel versions are not enumerated, so any kernel in use prior to including the commit is potentially vulnerable.

Risk and Exploitability

The vulnerability is a classic use‑after‑free (CWE‑416). No CVSS or EPSS data are provided, and the issue is not listed in the CISA KEV catalog. Exploitation would require local access or an attacker that can trigger kernel code paths that perform the faulty dereference. Though no publicly available exploits are documented, a successful exploitation could lead to privilege escalation or denial of service at the kernel level.

Generated by OpenCVE AI on April 3, 2026 at 18:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the kernel to a version that includes the acpi_processor_errata_piix4 use‑after‑free fix, such as the latest stable release from your distribution’s kernel package.
  • Verify the kernel version after updating by running 'uname -r' or checking the distribution’s release notes to ensure the patch is present.
  • Reboot the system to load the updated kernel and fully apply the fix.

Generated by OpenCVE AI on April 3, 2026 at 18:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 04 Apr 2026 01:15:00 +0000


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Fix previous acpi_processor_errata_piix4() fix After commi f132e089fe89 ("ACPI: processor: Fix NULL-pointer dereference in acpi_processor_errata_piix4()"), device pointers may be dereferenced after dropping references to the device objects pointed to by them, which may cause a use-after-free to occur. Moreover, debug messages about enabling the errata may be printed if the errata flags corresponding to them are unset. Address all of these issues by moving message printing to the points in the code where the errata flags are set.
Title ACPI: processor: Fix previous acpi_processor_errata_piix4() fix
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-03T15:15:27.698Z

Reserved: 2026-01-13T15:37:46.018Z

Link: CVE-2026-23443

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-03T16:16:28.573

Modified: 2026-04-03T16:16:28.573

Link: CVE-2026-23443

cve-icon Redhat

Severity :

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23443 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:16:08Z

Weaknesses