-

CVE-2022-50327

In the Linux kernel, the following vulnerability has been resolved:

ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value

The return value of acpi_fetch_acpi_dev() could be NULL, which would
cause a NULL pointer dereference to occur in acpi_device_hid().

[ rjw: Subject and changelog edits, added empty line after if () ]

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 8e8b5f12ee4ab6f5d252c9ca062a4ada9554e6d9
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < fdee7a0acc566c4194d40a501b8a1584e86cc208
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < ad1190744da9d812da55b76f2afce750afb0a3bd
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 2ecd629c788bbfb96be058edade2e934d3763eaf
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < b85f0e292f73f353eea915499604fbf50c8238b4
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 2437513a814b3e93bd02879740a8a06e52e2cf7d
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 5.4.*
Version 5.4.297
Status unaffected
Version <= 5.10.*
Version 5.10.241
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.0.*
Version 6.0.16
Status unaffected
Version <= 6.1.*
Version 6.1.2
Status unaffected
Version <= *
Version 6.2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string