Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1770 articles · 103891 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-23443EXPLOITEDPATCHED
linux · linux kernel

ACPI: processor: Fix previous acpi_processor_errata_piix4() fix

Description

In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Fix previous acpi_processor_errata_piix4() fix After commi f132e089fe89 ("ACPI: processor: Fix NULL-pointer dereference in acpi_processor_errata_piix4()"), device pointers may be dereferenced after dropping references to the device objects pointed to by them, which may cause a use-after-free to occur. Moreover, debug messages about enabling the errata may be printed if the errata flags corresponding to them are unset. Address all of these issues by moving message printing to the points in the code where the errata flags are set.

Affected Products

VendorProductVersions
linuxlinux kernelad86ac604f8391c0212a91412d4f764c7a85f254, 01e8751b37a366b1ca561add0042f2ceb18c03bf, b803811485ac0b2f774b6bf3abc8b999ba3b7033, 29f60d3d06818d40118a30d663231f027ae87a05, 0398b641be2b66c2fc7e0163c606ef19372e7ad5, f132e089fe89cadc2098991f0a3cb05c3f824ac6, 06724a60cfa9767ea90b0f5d3dfb5cdd251b64f5, 7.0-rc1, 7.0-rc4

References

  • https://git.kernel.org/stable/c/2e369ba9eb7b8a06e9cc35a3e7fe73e59272f8c2
  • https://git.kernel.org/stable/c/edf4c2aaee08e8fd503fbae705c801e92a0b55d7
  • https://git.kernel.org/stable/c/e0c470049344e9346fff79d7e2362212c216665e
  • https://git.kernel.org/stable/c/98473309a36acc271009b85e0bb53a4c0dddf5c2
  • https://git.kernel.org/stable/c/8583f62259e1b315d5239371adfb36939cdab741
  • https://git.kernel.org/stable/c/bf504b229cb8d534eccbaeaa23eba34c05131e25

Related News (2 articles)

Tier C
VulDB4h ago
CVE-2026-23443 | Linux Kernel up to 7.0-rc4 acpi_processor_errata_piix4 null pointer dereference
→ No new info (linked only)
Tier C
Linux Kernel CVEs5h ago
CVE-2026-23443: ACPI: processor: Fix previous acpi_processor_errata_piix4() fix
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
2e369ba9eb7b8a06e9cc35a3e7fe73e59272f8c2edf4c2aaee08e8fd503fbae705c801e92a0b55d7e0c470049344e9346fff79d7e2362212c216665e98473309a36acc271009b85e0bb53a4c0dddf5c28583f62259e1b315d5239371adfb36939cdab741bf504b229cb8d534eccbaeaa23eba34c05131e2506.1.1676.6.1306.12.786.18.206.19.107.0-rc5
PublishedApr 3, 2026
Last enriched4h agov2
Trending Score60
Source articles2
Independent2
Info Completeness7/14
Missing: cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-23461EXP
Bluetooth: L2CAP: Fix use-after-free in l2cap_unregister_user
Trending: 60
CRITICALCVE-2026-23475EXP
spi: fix statistics allocation
Trending: 60
CRITICALCVE-2026-23452EXP
PM: runtime: Fix a race condition related to device removal
Trending: 60
CRITICALCVE-2026-23467EXP
drm/i915/dmc: Fix an unlikely NULL pointer deference at probe
Trending: 60
CRITICALCVE-2026-23427EXP
ksmbd: fix use-after-free in durable v2 replay of active file handles
Trending: 60

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 3, 2026
Actively Exploited
Apr 3, 2026
Patch Available
Apr 3, 2026
Discovered by ZDM
Apr 3, 2026
Updated: severity, affectedVersions, activelyExploited
Apr 3, 2026

Version History

v2
Last enriched 4h ago
v2Tier C4h ago

Updated severity to CRITICAL, added affected version 7.0-rc4, and noted that no exploit is available.

severityaffectedVersionsactivelyExploited
via VulDB
v15h ago

Initial creation