{"id":"CVE-2022-50327","summary":"ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: processor: idle: Check acpi_fetch_acpi_dev() return value\n\nThe return value of acpi_fetch_acpi_dev() could be NULL, which would\ncause a NULL pointer dereference to occur in acpi_device_hid().\n\n[ rjw: Subject and changelog edits, added empty line after if () ]","modified":"2026-04-02T08:28:25.700425Z","published":"2025-09-15T14:49:26.711Z","related":["SUSE-SU-2025:4111-1","SUSE-SU-2025:4135-1","SUSE-SU-2025:4139-1","SUSE-SU-2025:4149-1","SUSE-SU-2025:4188-1","SUSE-SU-2025:4189-1","SUSE-SU-2025:4320-1","SUSE-SU-2026:0154-1","SUSE-SU-2026:0155-1","SUSE-SU-2026:0163-1","SUSE-SU-2026:0166-1","SUSE-SU-2026:0168-1","SUSE-SU-2026:0173-1","SUSE-SU-2026:0174-1","SUSE-SU-2026:0176-1","SUSE-SU-2026:0180-1","SUSE-SU-2026:0184-1","SUSE-SU-2026:0185-1","SUSE-SU-2026:0186-1","SUSE-SU-2026:0187-1","SUSE-SU-2026:0188-1","SUSE-SU-2026:0191-1","SUSE-SU-2026:0200-1","SUSE-SU-2026:0206-1","SUSE-SU-2026:0246-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50327.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2437513a814b3e93bd02879740a8a06e52e2cf7d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2ecd629c788bbfb96be058edade2e934d3763eaf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8e8b5f12ee4ab6f5d252c9ca062a4ada9554e6d9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ad1190744da9d812da55b76f2afce750afb0a3bd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b85f0e292f73f353eea915499604fbf50c8238b4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fdee7a0acc566c4194d40a501b8a1584e86cc208"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50327.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50327"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"a36a7fecfe6071732075ad5aa31196adce13181b"},{"fixed":"8e8b5f12ee4ab6f5d252c9ca062a4ada9554e6d9"},{"fixed":"fdee7a0acc566c4194d40a501b8a1584e86cc208"},{"fixed":"ad1190744da9d812da55b76f2afce750afb0a3bd"},{"fixed":"2ecd629c788bbfb96be058edade2e934d3763eaf"},{"fixed":"b85f0e292f73f353eea915499604fbf50c8238b4"},{"fixed":"2437513a814b3e93bd02879740a8a06e52e2cf7d"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50327.json"}}],"schema_version":"1.7.5"}