CVE-2022-48655
📋 TL;DR
This CVE describes an out-of-bounds memory access vulnerability in the Linux kernel's SCMI (System Control and Management Interface) reset domains subsystem. Attackers could potentially exploit this to cause kernel crashes or execute arbitrary code. Systems running vulnerable Linux kernel versions with SCMI firmware support are affected.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash, or potential arbitrary code execution with kernel privileges resulting in complete system compromise.
Likely Case
Kernel crash or system instability requiring reboot, potentially leading to denial of service.
If Mitigated
System remains stable with proper bounds checking preventing out-of-bounds access.
🎯 Exploit Status
Exploitation requires specific conditions and knowledge of SCMI subsystem internals.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits: 1f08a1b26cfc53b7715abc46857c6023bb1b87de, 7184491fc515f391afba23d0e9b690caaea72daf, 8e65edf0d37698f7a6cb174608d3ec7976baf49e, e9076ffbcaed5da6c182b144ef9f6e24554af268, f2277d9e2a0d092c13bae7ee82d75432bb8b5108
Vendor Advisory: https://git.kernel.org/stable/c/1f08a1b26cfc53b7715abc46857c6023bb1b87de
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version. 2. Check kernel commit history for your distribution. 3. Reboot system after kernel update.
🔧 Temporary Workarounds
Disable SCMI reset domains
linuxIf SCMI reset domains functionality is not required, disable it via kernel configuration.
Modify kernel configuration to disable CONFIG_ARM_SCMI_RESET_DOMAINS
🧯 If You Can't Patch
- Restrict local user access to systems with vulnerable kernels
- Implement strict process isolation and privilege separation
🔍 How to Verify
Check if Vulnerable:
Check kernel version and verify if SCMI reset domains support is enabled. Examine kernel configuration for CONFIG_ARM_SCMI_RESET_DOMAINS.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes the patched commits. Check dmesg for SCMI-related errors after system operation.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- SCMI subsystem errors in dmesg
- Out-of-bounds access warnings
Network Indicators:
- None - this is a local kernel vulnerability
SIEM Query:
Search for kernel panic events or SCMI-related error messages in system logs
🔗 References
- https://git.kernel.org/stable/c/1f08a1b26cfc53b7715abc46857c6023bb1b87de
- https://git.kernel.org/stable/c/7184491fc515f391afba23d0e9b690caaea72daf
- https://git.kernel.org/stable/c/8e65edf0d37698f7a6cb174608d3ec7976baf49e
- https://git.kernel.org/stable/c/e9076ffbcaed5da6c182b144ef9f6e24554af268
- https://git.kernel.org/stable/c/f2277d9e2a0d092c13bae7ee82d75432bb8b5108
- https://git.kernel.org/stable/c/1f08a1b26cfc53b7715abc46857c6023bb1b87de
- https://git.kernel.org/stable/c/7184491fc515f391afba23d0e9b690caaea72daf
- https://git.kernel.org/stable/c/8e65edf0d37698f7a6cb174608d3ec7976baf49e
- https://git.kernel.org/stable/c/e9076ffbcaed5da6c182b144ef9f6e24554af268
- https://git.kernel.org/stable/c/f2277d9e2a0d092c13bae7ee82d75432bb8b5108
- https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html
- https://security.netapp.com/advisory/ntap-20240912-0008/