
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-49451 affects the Linux kernel's firmware ARM SCMI (System Control and Management Interface) base protocol implementation. The vulnerability was discovered in the protocol enumeration functionality where an improper validation check could be bypassed due to integer overflow. The issue specifically occurs when enumerating protocols implemented by the SCMI platform using BASE_DISCOVER_LIST_PROTOCOLS (Kernel Git).
The vulnerability stems from an improper validation check in the base protocol implementation. The check employs a sum between unsigned integers that could overflow and cause the validation to be silently bypassed if the returned value 'loop_num_ret' is large enough. The vulnerable code was using the expression 'tot_num_ret + loop_num_ret > MAX_PROTOCOLS_IMP' which could be circumvented due to integer overflow (Kernel Git).
If exploited, this vulnerability could allow the validation check to be bypassed, potentially leading to buffer overflows or other memory-related issues when processing SCMI protocols. This could affect systems using the ARM SCMI interface for firmware communication (NVD).
The issue has been fixed by modifying the validation check to avoid the addition operation that could overflow. The new check uses the expression 'loop_num_ret > MAX_PROTOCOLS_IMP - tot_num_ret' which prevents the integer overflow condition. Users should update to a patched version of the Linux kernel that includes this fix (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."