• 公告ID (KylinSec-SA-2022-2679)

摘要:

DMA attacks on the parameter buffer used by the VariableRuntimeDxe software SMI handler could lead to a TOCTOU attack. DMA attacks on the parameter buffer used by the software SMI handler used by the driver VariableRuntimeDxe could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. This issue was discovered by Insyde engineering during a security review. This issue is fixed in Kernel 5.4: 05.44.23 and Kernel 5.5: 05.52.23. CWE-367 CWE-367 Report at: https://www.insyde.com/security-pledge/SA-2022056

安全等级: Low

公告ID: KylinSec-SA-2022-2679

发布日期: 2022年12月3日

关联CVE: CVE-2022-33986  

  • 详细介绍

1. 漏洞描述

   

DMA attacks on the parameter buffer used by the VariableRuntimeDxe software SMI handler could lead to a TOCTOU attack. DMA attacks on the parameter buffer used by the software SMI handler used by the driver VariableRuntimeDxe could lead to a TOCTOU attack on the SMI handler and lead to corruption of SMRAM. This issue was discovered by Insyde engineering during a security review. This issue is fixed in Kernel 5.4: 05.44.23 and Kernel 5.5: 05.52.23. CWE-367 CWE-367 Report at: https://www.insyde.com/security-pledge/SA-2022056

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2022-33986 KY3.4-4A kernel Unaffected
CVE-2022-33986 KY3.4-5A kernel Unaffected
CVE-2022-33986 KY3.5.1 kernel Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2022-2678 下一篇:KylinSec-SA-2022-2680