Vulnerability Details : CVE-2022-49451
In the Linux kernel, the following vulnerability has been resolved:
firmware: arm_scmi: Fix list protocols enumeration in the base protocol
While enumerating protocols implemented by the SCMI platform using
BASE_DISCOVER_LIST_PROTOCOLS, the number of returned protocols is
currently validated in an improper way since the check employs a sum
between unsigned integers that could overflow and cause the check itself
to be silently bypassed if the returned value 'loop_num_ret' is big
enough.
Fix the validation avoiding the addition.
Products affected by CVE-2022-49451
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-49451
0.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 4 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-49451
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST | 2025-03-17 |
CWE ids for CVE-2022-49451
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-49451
-
https://git.kernel.org/stable/c/98342148a8cd242855d7e257f298c966c96dba9f
Patch
-
https://git.kernel.org/stable/c/444a2d27fe9867d0da4b28fc45b793f32e099ab8
Patch
-
https://git.kernel.org/stable/c/6e7978695f4a6cbd83616b5a702b77fa2087b247
Patch
-
https://git.kernel.org/stable/c/1052f22e127d0c34c3387bb389424ba1c61491ff
Patch
-
https://git.kernel.org/stable/c/2ccfcd7a09c826516edcfe464b05071961aada3f
Patch
-
https://git.kernel.org/stable/c/8009120e0354a67068e920eb10dce532391361d0
Patch
-
https://git.kernel.org/stable/c/b0e4bafac8963c2d85ee18d3d01f393735acceec
Patch
Jump to