DMA attacks on the parameter buffer used by the PnpSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack) DMA attacks on the parameter buffer used by the PnpSmm driver could change the contents after parameter values have been checked but before they are used (a TOCTOU attack) . This issue was discovered by Insyde engineering during a security review. This iss was fixed in Kernel 5.2: 05.27.29, Kernel 5.3: 05.36.25, Kernel 5.4: 05.44.25, Kernel 5.5: 05.52.25. CWE-367 https://www.insyde.com/security-pledge/SA-2022043
History

Wed, 30 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2022-11-14T00:00:00.000Z

Updated: 2025-04-30T19:13:10.455Z

Reserved: 2022-05-16T00:00:00.000Z

Link: CVE-2022-30774

cve-icon Vulnrichment

Updated: 2024-08-03T06:56:14.020Z

cve-icon NVD

Status : Modified

Published: 2022-11-15T00:15:09.823

Modified: 2025-04-30T20:15:17.143

Link: CVE-2022-30774

cve-icon Redhat

No data.