CVE-2022-33907
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
DMA transactions which are targeted at input buffers used for the software SMI handler used by the IdeBusDxe driver could cause SMRAM corruption through a TOCTOU attack... DMA transactions which are targeted at input buffers used for the software SMI handler used by the IdeBusDxe driver could cause SMRAM corruption through a TOCTOU attack. This issue was discovered by Insyde engineering based on the general description provided by Intel's iSTARE group. Fixed in kernel 5.2: 05.27.25, kernel 5.3: 05.36.25, kernel 5.4: 05.44.25 https://www.insyde.com/security-pledge/SA-2022049
Las transacciones DMA que están dirigidas a los búferes de entrada utilizados para el controlador SMI de software utilizado por el controlador IdeBusDxe podrían causar corrupción de SMRAM a través de un ataque TOCTOU... Las transacciones DMA que están dirigidas a los búferes de entrada utilizados para el controlador SMI de software utilizado por el controlador IdeBusDxe podrían causar corrupción SMRAM a través de un ataque TOCTOU. Este problema fue descubierto por ingeniería de Insyde basándose en la descripción general proporcionada por el grupo iSTARE de Intel. Corregido en kernel 5.2: 05.27.25, kernel 5.3: 05.36.25, kernel 5.4: 05.44.25 https://www.insyde.com/security-pledge/SA-2022049
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-06-17 CVE Reserved
- 2022-11-14 CVE Published
- 2024-06-06 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
CAPEC
References (3)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.insyde.com/security-pledge | 2023-02-14 | |
https://www.insyde.com/security-pledge/SA-2022049 | 2023-02-14 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.2 < 5.2.05.27.25 Search vendor "Insyde" for product "Kernel" and version " >= 5.2 < 5.2.05.27.25" | - |
Affected
| ||||||
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.3 < 5.3.05.36.25 Search vendor "Insyde" for product "Kernel" and version " >= 5.3 < 5.3.05.36.25" | - |
Affected
| ||||||
Insyde Search vendor "Insyde" | Kernel Search vendor "Insyde" for product "Kernel" | >= 5.4 < 5.4.05.44.25 Search vendor "Insyde" for product "Kernel" and version " >= 5.4 < 5.4.05.44.25" | - |
Affected
|