First published: Mon Nov 14 2022(Updated: )
DMA attacks on the parameter buffer used by the Int15ServiceSmm software SMI handler could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. DMA attacks on the parameter buffer used by the software SMI handler used by the driver Int15ServiceSmm could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. This issue was discovered by Insyde engineering during a security review. This issue is fixed in Kernel 5.2: 05.27.23, Kernel 5.3: 05.36.23, Kernel 5.4: 05.44.23 and Kernel 5.5: 05.52.23 CWE-367
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Insyde Kernel | >=5.2<5.2.05.27.23 | |
Insyde Kernel | >=5.3<5.3.05.36.23 | |
Insyde Kernel | >=5.4<5.4.05.44.23 | |
Insyde Kernel | >=5.5<5.5.05.52.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-33982.
The severity of CVE-2022-33982 is medium with a CVSS score of 6.4.
The Insyde Kernel version 5.2 through 5.5 is affected by CVE-2022-33982.
DMA attacks on the parameter buffer could lead to a TOCTOU attack on the SMI handler and corruption of SMRAM.
Update the Insyde Kernel to a version that is not affected by the vulnerability.