First published: Mon Nov 14 2022(Updated: )
DMA attacks on the parameter buffer used by the VariableRuntimeDxe software SMI handler could lead to a TOCTOU attack. DMA attacks on the parameter buffer used by the software SMI handler used by the driver VariableRuntimeDxe could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. This issue was discovered by Insyde engineering during a security review. This issue is fixed in Kernel 5.4: 05.44.23 and Kernel 5.5: 05.52.23. CWE-367 CWE-367 Report at: https://www.insyde.com/security-pledge/SA-2022056
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Insyde Kernel | >=5.4<5.4.05.44.23 | |
Insyde Kernel | >=5.5<5.5.05.52.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-33986 is medium, with a severity value of 6.4.
The affected software for CVE-2022-33986 is Insyde Kernel version 5.4.05.44.23 and 5.5.05.52.23.
A TOCTOU attack, or Time-of-Check to Time-of-Use attack, is a vulnerability that occurs when a condition is checked at one time but the result is used at a different time.
DMA stands for Direct Memory Access and refers to a feature of computer systems that allows certain devices to access system memory directly without going through the CPU.
To mitigate the vulnerability in CVE-2022-33986, it is recommended to update the Insyde Kernel software to a version that is not affected by the vulnerability.