CVE-2022-48655

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-48655
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48655.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48655
Downstream
Related
Published
2024-04-28T13:01:00.822Z
Modified
2025-11-28T02:35:17.031939Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
firmware: arm_scmi: Harden accesses to the reset domains
Details

In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scmi: Harden accesses to the reset domains

Accessing reset domains descriptors by the index upon the SCMI drivers requests through the SCMI reset operations interface can potentially lead to out-of-bound violations if the SCMI driver misbehave.

Add an internal consistency check before any such domains descriptors accesses.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48655.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
95a15d80aa0de938299acfcbc6aa6f2b16f5d7e5
Fixed
7184491fc515f391afba23d0e9b690caaea72daf
Fixed
f2277d9e2a0d092c13bae7ee82d75432bb8b5108
Fixed
1f08a1b26cfc53b7715abc46857c6023bb1b87de
Fixed
8e65edf0d37698f7a6cb174608d3ec7976baf49e
Fixed
e9076ffbcaed5da6c182b144ef9f6e24554af268

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.4.0
Fixed
5.4.277
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.218
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.71
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.19.12