Description
In the Linux kernel, the following vulnerability has been resolved:

ACPI: processor: Fix previous acpi_processor_errata_piix4() fix

After commi f132e089fe89 ("ACPI: processor: Fix NULL-pointer dereference
in acpi_processor_errata_piix4()"), device pointers may be dereferenced
after dropping references to the device objects pointed to by them,
which may cause a use-after-free to occur.

Moreover, debug messages about enabling the errata may be printed
if the errata flags corresponding to them are unset.

Address all of these issues by moving message printing to the points
in the code where the errata flags are set.
Published: 2026-04-03
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Use-after‑free in kernel ACPI processor code
Action: Patch Now
AI Analysis

Impact

The Linux kernel contains a flaw in the ACPI processor errata handling routine that may cause a use‑after‑free when a device pointer is dereferenced after the kernel has released its reference to the underlying device object. This flaw is a classic null‑pointer dereference that can corrupt kernel memory and, if successfully exploited, could lead to kernel panic or privilege escalation.

Affected Systems

All Linux kernel versions that include the ACPI processor errata logic before the mentioned upstream commit are affected. The change applies to kernel releases that contain the acpi_processor_errata_piix4 function, which are all kernels up to the point where the patch was integrated. Operators should verify whether their deployed kernel incorporates this fix.

Risk and Exploitability

The CVSS score of 5.5 indicates a moderate severity. The EPSS score of less than 1 % suggests a low current likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Exploitation would require the attacker to trigger the faulty code path in kernel mode, most likely through local or privilege‑elevated access. No publicly available exploits are currently documented, but successful exploitation could disrupt the affected system or provide a foothold for higher‑privilege attacks.

Generated by OpenCVE AI on April 29, 2026 at 03:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the kernel to the latest version supplied by your distribution that includes the acpi_processor_errata_piix4 fix.
  • Reboot the system to load the updated kernel and fully apply the fix.
  • If the available distribution kernels are outdated, obtain the upstream patch that resolves the use‑after‑free and integrate or backport it to the installed kernel.

Generated by OpenCVE AI on April 29, 2026 at 03:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Thu, 23 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476
CPEs cpe:2.3:o:linux:linux_kernel:5.15.202:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Sat, 18 Apr 2026 09:15:00 +0000


Sat, 04 Apr 2026 01:15:00 +0000


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Fix previous acpi_processor_errata_piix4() fix After commi f132e089fe89 ("ACPI: processor: Fix NULL-pointer dereference in acpi_processor_errata_piix4()"), device pointers may be dereferenced after dropping references to the device objects pointed to by them, which may cause a use-after-free to occur. Moreover, debug messages about enabling the errata may be printed if the errata flags corresponding to them are unset. Address all of these issues by moving message printing to the points in the code where the errata flags are set.
Title ACPI: processor: Fix previous acpi_processor_errata_piix4() fix
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:07:00.396Z

Reserved: 2026-01-13T15:37:46.018Z

Link: CVE-2026-23443

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-03T16:16:28.573

Modified: 2026-04-23T20:58:48.307

Link: CVE-2026-23443

cve-icon Redhat

Severity :

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23443 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T03:30:15Z

Weaknesses