First published: Mon Nov 14 2022(Updated: )
DMA transactions which are targeted at input buffers used for the SmmResourceCheckDxe software SMI handler cause SMRAM corruption (a TOCTOU attack) DMA transactions which are targeted at input buffers used for the software SMI handler used by the SmmResourceCheckDxe driver could cause SMRAM corruption through a TOCTOU attack... This issue was discovered by Insyde engineering. Fixed in kernel Kernel 5.2: 05.27.23. Kernel 5.3: 05.36.23. Kernel 5.4: 05.44.23. Kernel 5.5: 05.52.23 https://www.insyde.com/security-pledge/SA-2022046
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Insyde Kernel | >=5.2<5.2.05.27.23 | |
Insyde Kernel | >=5.3<5.3.05.36.23 | |
Insyde Kernel | >=5.4<5.4.05.44.23 | |
Insyde Kernel | >=5.5<5.5.05.52.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-32267 is medium with a CVSS score of 6.4.
CVE-2022-32267 affects the Insyde Kernel software versions 5.2 to 5.5.
CVE-2022-32267 can cause SMRAM corruption, resulting in a TOCTOU (Time of Check, Time of Use) attack.
To mitigate CVE-2022-32267, it is recommended to install the patches provided by Insyde or contact the vendor for further instructions.
More information about CVE-2022-32267 can be found on the Insyde Security Pledge website or in the SA-2022046 advisory.