Input validation error in Linux kernel firmware arm_scmi driver



| Updated: 2025-05-11
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-49451
CWE-ID CWE-20
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Input validation error

EUVDB-ID: #VU104721

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49451

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the scmi_base_implementation_list_get() function in drivers/firmware/arm_scmi/base.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 5.4 - 5.4.197

CPE2.3 External links

https://git.kernel.org/stable/c/1052f22e127d0c34c3387bb389424ba1c61491ff
https://git.kernel.org/stable/c/2ccfcd7a09c826516edcfe464b05071961aada3f
https://git.kernel.org/stable/c/444a2d27fe9867d0da4b28fc45b793f32e099ab8
https://git.kernel.org/stable/c/6e7978695f4a6cbd83616b5a702b77fa2087b247
https://git.kernel.org/stable/c/8009120e0354a67068e920eb10dce532391361d0
https://git.kernel.org/stable/c/98342148a8cd242855d7e257f298c966c96dba9f
https://git.kernel.org/stable/c/b0e4bafac8963c2d85ee18d3d01f393735acceec
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.198


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###