CVE-2022-29279
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Use of a untrusted pointer allows tampering with SMRAM and OS memory in SdHostDriver and SdMmcDevice Use of a untrusted pointer allows tampering with SMRAM and OS memory in SdHostDriver and SdMmcDevice. This issue was discovered by Insyde during security review. It was fixed in: Kernel 5.0: version 05.09.17 Kernel 5.1: version 05.17.17 Kernel 5.2: version 05.27.17 Kernel 5.3: version 05.36.17 Kernel 5.4: version 05.44.17 Kernel 5.5: version 05.52.17 https://www.insyde.com/security-pledge/SA-2022062
El uso de un puntero que no es de confianza permite alterar la SMRAM y la memoria del sistema operativo en SdHostDriver y SdMmcDevice. El uso de un puntero que no es de confianza permite alterar la SMRAM y la memoria del sistema operativo en SdHostDriver y SdMmcDevice. Insyde descubrió este problema durante la revisión de seguridad. Se solucionó en: Kernel 5.0: versión 05.09.17 Kernel 5.1: versión 05.17.17 Kernel 5.2: versión 05.27.17 Kernel 5.3: versión 05.36.17 Kernel 5.4: versión 05.44.17 Kernel 5.5: versión 05.52.17 https:/ /www.insyde.com/security-pledge/SA-2022062
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-04-15 CVE Reserved
- 2022-11-15 CVE Published
- 2024-06-07 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.insyde.com/security-pledge | 2022-11-23 | |
https://www.insyde.com/security-pledge/SA-2022062 | 2022-11-23 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.0 < 5.0.05.09.17 Search vendor "Insyde" for product "Kernel" and version " >= 5.0 < 5.0.05.09.17" | - |
Affected
| ||||||
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.1 < 5.1.05.17.17 Search vendor "Insyde" for product "Kernel" and version " >= 5.1 < 5.1.05.17.17" | - |
Affected
| ||||||
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.2 < 5.2.05.27.17 Search vendor "Insyde" for product "Kernel" and version " >= 5.2 < 5.2.05.27.17" | - |
Affected
| ||||||
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.3 < 5.3.05.36.17 Search vendor "Insyde" for product "Kernel" and version " >= 5.3 < 5.3.05.36.17" | - |
Affected
| ||||||
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.4 < 5.4.05.44.17 Search vendor "Insyde" for product "Kernel" and version " >= 5.4 < 5.4.05.44.17" | - |
Affected
| ||||||
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.5 < 5.5.05.52.17 Search vendor "Insyde" for product "Kernel" and version " >= 5.5 < 5.5.05.52.17" | - |
Affected
|