Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1706 articles · 103856 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-23443EXPLOITEDPATCHED
linux · linux kernel

ACPI: processor: Fix previous acpi_processor_errata_piix4() fix

Description

In the Linux kernel, the following vulnerability has been resolved: ACPI: processor: Fix previous acpi_processor_errata_piix4() fix After commi f132e089fe89 ("ACPI: processor: Fix NULL-pointer dereference in acpi_processor_errata_piix4()"), device pointers may be dereferenced after dropping references to the device objects pointed to by them, which may cause a use-after-free to occur. Moreover, debug messages about enabling the errata may be printed if the errata flags corresponding to them are unset. Address all of these issues by moving message printing to the points in the code where the errata flags are set.

Affected Products

VendorProductVersions
linuxlinux kernelad86ac604f8391c0212a91412d4f764c7a85f254, 01e8751b37a366b1ca561add0042f2ceb18c03bf, b803811485ac0b2f774b6bf3abc8b999ba3b7033, 29f60d3d06818d40118a30d663231f027ae87a05, 0398b641be2b66c2fc7e0163c606ef19372e7ad5, f132e089fe89cadc2098991f0a3cb05c3f824ac6, 06724a60cfa9767ea90b0f5d3dfb5cdd251b64f5, 7.0-rc1, 7.0-rc4

References

  • https://git.kernel.org/stable/c/2e369ba9eb7b8a06e9cc35a3e7fe73e59272f8c2
  • https://git.kernel.org/stable/c/edf4c2aaee08e8fd503fbae705c801e92a0b55d7
  • https://git.kernel.org/stable/c/e0c470049344e9346fff79d7e2362212c216665e
  • https://git.kernel.org/stable/c/98473309a36acc271009b85e0bb53a4c0dddf5c2
  • https://git.kernel.org/stable/c/8583f62259e1b315d5239371adfb36939cdab741
  • https://git.kernel.org/stable/c/bf504b229cb8d534eccbaeaa23eba34c05131e25

Related News (2 articles)

Tier C
VulDB3h ago
CVE-2026-23443 | Linux Kernel up to 7.0-rc4 acpi_processor_errata_piix4 null pointer dereference
→ No new info (linked only)
Tier C
Linux Kernel CVEs3h ago
CVE-2026-23443: ACPI: processor: Fix previous acpi_processor_errata_piix4() fix
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
2e369ba9eb7b8a06e9cc35a3e7fe73e59272f8c2edf4c2aaee08e8fd503fbae705c801e92a0b55d7e0c470049344e9346fff79d7e2362212c216665e98473309a36acc271009b85e0bb53a4c0dddf5c28583f62259e1b315d5239371adfb36939cdab741bf504b229cb8d534eccbaeaa23eba34c05131e2506.1.1676.6.1306.12.786.18.206.19.107.0-rc5
PublishedApr 3, 2026
Last enriched2h agov2
Trending Score61
Source articles2
Independent2
Info Completeness7/14
Missing: cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-31393EXP
Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access
Trending: 61
CRITICALCVE-2026-31397EXP
mm/huge_memory: fix use of NULL folio in move_pages_huge_pmd()
Trending: 61
CRITICALCVE-2026-23463EXP
soc: fsl: qbman: fix race condition in qman_destroy_fq
Trending: 61
CRITICALCVE-2026-23472EXP
serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN
Trending: 61
CRITICALCVE-2026-23467EXP
drm/i915/dmc: Fix an unlikely NULL pointer deference at probe
Trending: 61

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 3, 2026
Actively Exploited
Apr 3, 2026
Patch Available
Apr 3, 2026
Discovered by ZDM
Apr 3, 2026
Updated: severity, affectedVersions, activelyExploited
Apr 3, 2026

Version History

v2
Last enriched 2h ago
v2Tier C2h ago

Updated severity to CRITICAL, added affected version 7.0-rc4, and noted that no exploit is available.

severityaffectedVersionsactivelyExploited
via VulDB
v13h ago

Initial creation