DMA attacks on the parameter buffer used by the IhisiSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack). DMA attacks on the parameter buffer used by the IhisiSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack). This issue was discovered by Insyde engineering. This issue is fixed in Kernel 5.4: 05.44.23 and Kernel 5.5: 05.52.23. CWE-367
References
Link | Resource |
---|---|
https://www.insyde.com/security-pledge | Vendor Advisory |
https://www.insyde.com/security-pledge/SA-2022042 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
18 Nov 2022, 16:01
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.4 |
CWE | CWE-367 | |
References | (MISC) https://www.insyde.com/security-pledge/SA-2022042 - Vendor Advisory | |
References | (MISC) https://www.insyde.com/security-pledge - Vendor Advisory | |
First Time |
Insyde kernel
Insyde |
|
CPE | cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:* |
14 Nov 2022, 22:51
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-14 22:15
Updated : 2023-12-10 14:35
NVD link : CVE-2022-30773
Mitre link : CVE-2022-30773
CVE.ORG link : CVE-2022-30773
JSON object : View
Products Affected
insyde
- kernel
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition