CVE-2026-23332NULL Pointer Dereference in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 94.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 25

Description

In the Linux kernel, the following vulnerability has been resolved: cpufreq: intel_pstate: Fix crash during turbo disable When the system is booted with kernel command line argument "nosmt" or "maxcpus" to limit the number of CPUs, disabling turbo via: echo 1 > /sys/devices/system/cpu/intel_pstate/no_turbo results in a crash: PF: supervisor read access in kernel mode PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: Oops: 0000 [#1] SMP PTI ... RIP: 0010:store_no_turbo+0x100/0x1f0

Affected Packages4 packages

Linuxlinux/linux_kernel6.16.06.18.17+1
Debianlinux/linux_kernel< 6.19.8-1
CVEListV5linux/linux973207ae3d7c3c92df4a382df5d7bd695deaa904a1850e2aef4d15405e7ff53fd51c4b3124d46182+3
debiandebian/linux< linux 6.19.8-1 (forky)

🔴Vulnerability Details

3
GHSA
GHSA-76w7-8x62-j4qm: In the Linux kernel, the following vulnerability has been resolved: cpufreq: intel_pstate: Fix crash during turbo disable When the system is booted2026-03-25
OSV
CVE-2026-23332: In the Linux kernel, the following vulnerability has been resolved: cpufreq: intel_pstate: Fix crash during turbo disable When the system is booted wi2026-03-25
OSV
cpufreq: intel_pstate: Fix crash during turbo disable2026-03-25

📋Vendor Advisories

2
Red Hat
kernel: cpufreq: intel_pstate: Fix crash during turbo disable2026-03-25
Debian
CVE-2026-23332: linux - In the Linux kernel, the following vulnerability has been resolved: cpufreq: in...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23332 Impact, Exploitability, and Mitigation Steps | Wiz