CVE-2022-50327

Source
https://cve.org/CVERecord?id=CVE-2022-50327
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50327.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50327
Downstream
Related
Published
2025-09-15T14:49:26.711Z
Modified
2026-04-11T12:44:55.896212Z
Summary
ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value
Details

In the Linux kernel, the following vulnerability has been resolved:

ACPI: processor: idle: Check acpifetchacpi_dev() return value

The return value of acpifetchacpidev() could be NULL, which would cause a NULL pointer dereference to occur in acpidevice_hid().

[ rjw: Subject and changelog edits, added empty line after if () ]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50327.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a36a7fecfe6071732075ad5aa31196adce13181b
Fixed
8e8b5f12ee4ab6f5d252c9ca062a4ada9554e6d9
Fixed
fdee7a0acc566c4194d40a501b8a1584e86cc208
Fixed
ad1190744da9d812da55b76f2afce750afb0a3bd
Fixed
2ecd629c788bbfb96be058edade2e934d3763eaf
Fixed
b85f0e292f73f353eea915499604fbf50c8238b4
Fixed
2437513a814b3e93bd02879740a8a06e52e2cf7d

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50327.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.8.0
Fixed
5.4.297
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.241
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.190
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.16
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50327.json"