Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-30774

Опубликовано: 15 нояб. 2022
Источник: nvd
CVSS3: 6.4
EPSS Низкий

Описание

DMA attacks on the parameter buffer used by the PnpSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack) DMA attacks on the parameter buffer used by the PnpSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack) . This issue was discovered by Insyde engineering during a security review. This iss was fixed in Kernel 5.2: 05.27.29, Kernel 5.3: 05.36.25, Kernel 5.4: 05.44.25, Kernel 5.5: 05.52.25. CWE-367 https://www.insyde.com/security-pledge/SA-2022043

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*
Версия от 5.2 (включая) до 5.2.05.27.29 (исключая)
cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*
Версия от 5.3 (включая) до 5.3.05.36.25 (исключая)
cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*
Версия от 5.4 (включая) до 5.4.05.44.25 (исключая)
cpe:2.3:a:insyde:kernel:*:*:*:*:*:*:*:*
Версия от 5.5 (включая) до 5.5.05.52.25 (исключая)

EPSS

Процентиль: 16%
0.00052
Низкий

6.4 Medium

CVSS3

Дефекты

CWE-367
CWE-367

Связанные уязвимости

CVSS3: 6.4
github
около 3 лет назад

DMA attacks on the parameter buffer used by the PnpSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack) DMA attacks on the parameter buffer used by the PnpSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack) . This issue was discovered by Insyde engineering during a security review. This iss was fixed in Kernel 5.2: 05.27.29, Kernel 5.3: 05.36.25, Kernel 5.4: 05.44.25, Kernel 5.5: 05.52.25. CWE-367 https://www.insyde.com/security-pledge/SA-2022043

EPSS

Процентиль: 16%
0.00052
Низкий

6.4 Medium

CVSS3

Дефекты

CWE-367
CWE-367