Memory Mapping Vulnerability in Packard Bell Dot SC Product by Linux Kernel
CVE-2022-50320

Currently unrated

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
15 September 2025

What is CVE-2022-50320?

The Linux kernel has encountered a memory mapping vulnerability affecting the Packard Bell Dot SC, specifically with the FPDT table that contains invalid physical addresses. These addresses, characterized by high bits set outside the CPU's supported range, can trigger errors during calls to acpi_os_map_memory(). The flaw can result in a warning notification (WARN_ON), leading to a system oops and stack trace. A patch has been introduced to add verification of physical addresses prior to executing the memory mapping function, effectively preventing erratic behaviors and enhancing system stability.

Affected Version(s)

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 30eca146c89d216dda95868ce00a2d35cf73d5a4

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 90bfc9ae875dfbed2e6089516520204cd431dba3

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 16046a716c8e1f447909bec9b478d58e6e25e513

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2022-50320 : Memory Mapping Vulnerability in Packard Bell Dot SC Product by Linux Kernel