Description
In the Linux kernel, the following vulnerability has been resolved:

ACPI: processor: Fix NULL-pointer dereference in acpi_processor_errata_piix4()

In acpi_processor_errata_piix4(), the pointer dev is first assigned an IDE
device and then reassigned an ISA device:

dev = pci_get_subsys(..., PCI_DEVICE_ID_INTEL_82371AB, ...);
dev = pci_get_subsys(..., PCI_DEVICE_ID_INTEL_82371AB_0, ...);

If the first lookup succeeds but the second fails, dev becomes NULL. This
leads to a potential null-pointer dereference when dev_dbg() is called:

if (errata.piix4.bmisx)
dev_dbg(&dev->dev, ...);

To prevent this, use two temporary pointers and retrieve each device
independently, avoiding overwriting dev with a possible NULL value.

[ rjw: Subject adjustment, added an empty code line ]
Published: 2026-05-08
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A null-pointer dereference occurs in acpi_processor_errata_piix4() when a first device lookup succeeds and a second lookup fails, overwriting the device pointer with NULL and causing dev_dbg() to dereference a NULL pointer. This flaw can trigger a kernel crash, effectively denying service to the system. The weakness is a classic null-pointer dereference (CWE‑476).

Affected Systems

The vulnerability affects the Linux kernel, as indicated by the vendor and product names. No specific kernel versions are listed in the CNA data; however, any kernel implementing the defective acpi_processor_errata_piix4() code may be affected. Users running an unpatched kernel should verify whether the code path is enabled.

Risk and Exploitability

The CVSS score is not provided, and no EPSS value is available, so the exact severity cannot be quantified. The vulnerability is not listed in the CISA KEV catalog. Lack of a public exploit does not preclude risk; the flaw could be triggered by an attacker with local or remote access that can influence ACPI device handling, such as during normal boot or through crafted ACPI tables. The risk is principally a denial-of-service via kernel panic rather than data exfiltration or privilege escalation.

Generated by OpenCVE AI on May 8, 2026 at 15:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest stable Linux kernel that includes the acpi_processor_errata_piix4() fix.
  • If a kernel update cannot be performed immediately, disable the offending ACPI errata path (if configurable) or restrict the use of affected ACPI hardware until a patched kernel is available.
  • Continuously monitor system logs and kernel panic data for signs of ACPI‑related crashes, and conduct targeted testing on systems with Intel PIIX4 hardware to confirm that the issue has been mitigated.

Generated by OpenCVE AI on May 8, 2026 at 15:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 15:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476

Fri, 08 May 2026 13:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Fix NULL-pointer dereference in acpi_processor_errata_piix4() In acpi_processor_errata_piix4(), the pointer dev is first assigned an IDE device and then reassigned an ISA device: dev = pci_get_subsys(..., PCI_DEVICE_ID_INTEL_82371AB, ...); dev = pci_get_subsys(..., PCI_DEVICE_ID_INTEL_82371AB_0, ...); If the first lookup succeeds but the second fails, dev becomes NULL. This leads to a potential null-pointer dereference when dev_dbg() is called: if (errata.piix4.bmisx) dev_dbg(&dev->dev, ...); To prevent this, use two temporary pointers and retrieve each device independently, avoiding overwriting dev with a possible NULL value. [ rjw: Subject adjustment, added an empty code line ]
Title ACPI: processor: Fix NULL-pointer dereference in acpi_processor_errata_piix4()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T13:11:30.386Z

Reserved: 2026-05-01T14:12:56.001Z

Link: CVE-2026-43313

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T14:16:39.710

Modified: 2026-05-08T14:16:39.710

Link: CVE-2026-43313

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T15:45:08Z

Weaknesses