CVE-2022-50327
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
15/09/2025
Last modified:
16/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value<br />
<br />
The return value of acpi_fetch_acpi_dev() could be NULL, which would<br />
cause a NULL pointer dereference to occur in acpi_device_hid().<br />
<br />
[ rjw: Subject and changelog edits, added empty line after if () ]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.8 (including) | 5.4.297 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.241 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.190 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.0.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1 (including) | 6.1.2 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2437513a814b3e93bd02879740a8a06e52e2cf7d
- https://git.kernel.org/stable/c/2ecd629c788bbfb96be058edade2e934d3763eaf
- https://git.kernel.org/stable/c/8e8b5f12ee4ab6f5d252c9ca062a4ada9554e6d9
- https://git.kernel.org/stable/c/ad1190744da9d812da55b76f2afce750afb0a3bd
- https://git.kernel.org/stable/c/b85f0e292f73f353eea915499604fbf50c8238b4
- https://git.kernel.org/stable/c/fdee7a0acc566c4194d40a501b8a1584e86cc208
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html



