Vulnerability Details : CVE-2022-48655
In the Linux kernel, the following vulnerability has been resolved:
firmware: arm_scmi: Harden accesses to the reset domains
Accessing reset domains descriptors by the index upon the SCMI drivers
requests through the SCMI reset operations interface can potentially
lead to out-of-bound violations if the SCMI driver misbehave.
Add an internal consistency check before any such domains descriptors
accesses.
Products affected by CVE-2022-48655
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-48655
0.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 50 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-48655
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.1
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-07-03 |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | 2024-04-30 |
CWE ids for CVE-2022-48655
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
References for CVE-2022-48655
-
https://git.kernel.org/stable/c/f2277d9e2a0d092c13bae7ee82d75432bb8b5108
firmware: arm_scmi: Harden accesses to the reset domains - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/1f08a1b26cfc53b7715abc46857c6023bb1b87de
firmware: arm_scmi: Harden accesses to the reset domains - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/7184491fc515f391afba23d0e9b690caaea72daf
firmware: arm_scmi: Harden accesses to the reset domains - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/8e65edf0d37698f7a6cb174608d3ec7976baf49e
firmware: arm_scmi: Harden accesses to the reset domains - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://git.kernel.org/stable/c/e9076ffbcaed5da6c182b144ef9f6e24554af268
firmware: arm_scmi: Harden accesses to the reset domains - kernel/git/stable/linux.git - Linux kernel stable treePatch
-
https://security.netapp.com/advisory/ntap-20240912-0008/
Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html
[SECURITY] [DLA 3843-1] linux-5.10 security updateMailing List
Jump to