CVE-2026-23443
Use-After-Free in Linux Kernel ACPI Processor Component
Publication date: 2026-04-03
Last updated on: 2026-04-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.1.165 (inc) to 6.1.167 (exc) |
| linux | linux_kernel | From 6.12.75 (inc) to 6.12.78 (exc) |
| linux | linux_kernel | From 6.18.16 (inc) to 6.18.20 (exc) |
| linux | linux_kernel | From 6.19.6 (inc) to 6.19.10 (exc) |
| linux | linux_kernel | From 6.6.128 (inc) to 6.6.130 (exc) |
| linux | linux_kernel | 5.15.202 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's ACPI processor code. It involves a use-after-free issue caused by dereferencing device pointers after their referenced device objects have been freed. This problem arose after a previous fix to the acpi_processor_errata_piix4() function, where device pointers could be accessed incorrectly, potentially leading to memory errors.
Additionally, debug messages related to enabling certain errata flags could be printed even when those flags were not set, which was addressed by moving the message printing to the correct points in the code.
How can this vulnerability impact me? :
The use-after-free vulnerability can lead to undefined behavior in the Linux kernel, such as system crashes, memory corruption, or potential escalation of privileges if exploited. This can affect system stability and security, potentially allowing attackers to execute arbitrary code or cause denial of service.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved in the Linux kernel by fixing the acpi_processor_errata_piix4() function to prevent use-after-free issues and improper debug message printing.
To mitigate this vulnerability, you should update your Linux kernel to a version that includes the fix for CVE-2026-23443.