Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-49451 |
CWE-ID | CWE-20 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU104721
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-49451
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the scmi_base_implementation_list_get() function in drivers/firmware/arm_scmi/base.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 5.4 - 5.4.197
CPE2.3https://git.kernel.org/stable/c/1052f22e127d0c34c3387bb389424ba1c61491ff
https://git.kernel.org/stable/c/2ccfcd7a09c826516edcfe464b05071961aada3f
https://git.kernel.org/stable/c/444a2d27fe9867d0da4b28fc45b793f32e099ab8
https://git.kernel.org/stable/c/6e7978695f4a6cbd83616b5a702b77fa2087b247
https://git.kernel.org/stable/c/8009120e0354a67068e920eb10dce532391361d0
https://git.kernel.org/stable/c/98342148a8cd242855d7e257f298c966c96dba9f
https://git.kernel.org/stable/c/b0e4bafac8963c2d85ee18d3d01f393735acceec
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.198
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.