DMA attacks on the parameter buffer used by the IhisiSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack). DMA attacks on the parameter buffer used by the IhisiSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack). This issue was discovered by Insyde engineering. This issue is fixed in Kernel 5.4: 05.44.23 and Kernel 5.5: 05.52.23. CWE-367
References
Link | Resource |
---|---|
https://www.insyde.com/security-pledge | Vendor Advisory |
https://www.insyde.com/security-pledge/SA-2022042 | Vendor Advisory |
https://www.insyde.com/security-pledge | Vendor Advisory |
https://www.insyde.com/security-pledge/SA-2022042 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.insyde.com/security-pledge - Vendor Advisory | |
References | () https://www.insyde.com/security-pledge/SA-2022042 - Vendor Advisory |
Information
Published : 2022-11-14 22:15
Updated : 2025-04-30 20:15
NVD link : CVE-2022-30773
Mitre link : CVE-2022-30773
CVE.ORG link : CVE-2022-30773
JSON object : View
Products Affected
insyde
- kernel
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition