CVE-2022-49451

5.5 MEDIUM

📋 TL;DR

This vulnerability in the Linux kernel's SCMI firmware subsystem involves an integer overflow when validating protocol enumeration responses. It could allow attackers to bypass security checks and potentially cause denial of service or system instability. Systems using affected Linux kernel versions with ARM SCMI firmware are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires ARM SCMI firmware subsystem to be enabled and used.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic or system crash leading to denial of service, potentially allowing privilege escalation if combined with other vulnerabilities.

🟠

Likely Case

System instability or denial of service affecting SCMI-related functionality.

🟢

If Mitigated

Minimal impact with proper kernel hardening and privilege separation.

🌐 Internet-Facing: LOW - Requires local access or ability to interact with SCMI subsystem.
🏢 Internal Only: MEDIUM - Could be exploited by local users or through compromised applications.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access or ability to interact with SCMI interface. No public exploits known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 1052f22e127d0c34c3387bb389424ba1c61491ff, 2ccfcd7a09c826516edcfe464b05071961aada3f, 444a2d27fe9867d0da4b28fc45b793f32e099ab8, 6e7978695f4a6cbd83616b5a702b77fa2087b247, 8009120e0354a67068e920eb10dce532391361d0

Vendor Advisory: https://git.kernel.org/stable/c/1052f22e127d0c34c3387bb389424ba1c61491ff

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Check distribution-specific security advisories. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable SCMI subsystem

linux

Disable ARM System Control and Management Interface if not required

echo 'blacklist scmi' > /etc/modprobe.d/scmi-blacklist.conf
update-initramfs -u

🧯 If You Can't Patch

  • Implement strict access controls to limit who can interact with SCMI interfaces
  • Monitor system logs for unusual SCMI-related activity or system instability

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if SCMI subsystem is loaded: 'lsmod | grep scmi' and 'uname -r'

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits or check with distribution-specific security tools

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • SCMI subsystem errors in dmesg
  • System instability reports

Network Indicators:

  • None - local vulnerability

SIEM Query:

search 'kernel panic' OR 'scmi' OR 'firmware error' in system logs

🔗 References

📤 Share & Export