CVE-2026-23443
Received Received - Intake
Use-After-Free in Linux Kernel ACPI Processor Component

Publication date: 2026-04-03

Last updated on: 2026-04-23

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Fix previous acpi_processor_errata_piix4() fix After commi f132e089fe89 ("ACPI: processor: Fix NULL-pointer dereference in acpi_processor_errata_piix4()"), device pointers may be dereferenced after dropping references to the device objects pointed to by them, which may cause a use-after-free to occur. Moreover, debug messages about enabling the errata may be printed if the errata flags corresponding to them are unset. Address all of these issues by moving message printing to the points in the code where the errata flags are set.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-03
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2026-04-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 6 associated CPEs
Vendor Product Version / Range
linux linux_kernel From 6.1.165 (inc) to 6.1.167 (exc)
linux linux_kernel From 6.12.75 (inc) to 6.12.78 (exc)
linux linux_kernel From 6.18.16 (inc) to 6.18.20 (exc)
linux linux_kernel From 6.19.6 (inc) to 6.19.10 (exc)
linux linux_kernel From 6.6.128 (inc) to 6.6.130 (exc)
linux linux_kernel 5.15.202
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-476 The product dereferences a pointer that it expects to be valid but is NULL.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's ACPI processor code. It involves a use-after-free issue caused by dereferencing device pointers after their referenced device objects have been freed. This problem arose after a previous fix to the acpi_processor_errata_piix4() function, where device pointers could be accessed incorrectly, potentially leading to memory errors.

Additionally, debug messages related to enabling certain errata flags could be printed even when those flags were not set, which was addressed by moving the message printing to the correct points in the code.


How can this vulnerability impact me? :

The use-after-free vulnerability can lead to undefined behavior in the Linux kernel, such as system crashes, memory corruption, or potential escalation of privileges if exploited. This can affect system stability and security, potentially allowing attackers to execute arbitrary code or cause denial of service.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability has been resolved in the Linux kernel by fixing the acpi_processor_errata_piix4() function to prevent use-after-free issues and improper debug message printing.

To mitigate this vulnerability, you should update your Linux kernel to a version that includes the fix for CVE-2026-23443.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart