CVE-2022-48655

HIGH

Linux Kernel < 5.4.277 - Memory Corruption

Title source: rule
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Harden accesses to the reset domains Accessing reset domains descriptors by the index upon the SCMI drivers requests through the SCMI reset operations interface can potentially lead to out-of-bound violations if the SCMI driver misbehave. Add an internal consistency check before any such domains descriptors accesses.

Scores

CVSS v3 7.8
EPSS 0.0005
EPSS Percentile 15.2%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-119 CWE-125
Status published
Products (7)
debian/debian_linux 10.0
linux/Kernel 5.11.0 - 5.15.71linux
linux/Kernel 5.16.0 - 5.19.12linux
linux/Kernel 5.4.0 - 5.4.277linux
linux/Kernel 5.5.0 - 5.10.218linux
linux/linux_kernel 6.0 rc1 (6 CPE variants)
linux/linux_kernel 5.4 - 5.4.277
Published Apr 28, 2024
Tracked Since Feb 18, 2026