René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

112 lines
3.6 KiB
JSON

{
"id": "CVE-2022-30771",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-15T21:15:36.910",
"lastModified": "2022-11-23T17:21:51.870",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Initialization function in PnpSmm could lead to SMRAM corruption when using subsequent PNP SMI functions Initialization function in PnpSmm could lead to SMRAM corruption when using subsequent PNP SMI functions. This issue was discovered by Insyde engineering during a security review. Fixed in: Kernel 5.1: Version 05.17.25 Kernel 5.2: Version 05.27.25 Kernel 5.3: Version 05.36.25 Kernel 5.4: Version 05.44.25 Kernel 5.5: Version 05.52.25 https://www.insyde.com/security-pledge/SA-2022064"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:insyde:kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1",
"versionEndExcluding": "5.1.05.17.25",
"matchCriteriaId": "5BBA052D-95BD-4DAA-B2EB-158CA57C92F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:insyde:kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.2",
"versionEndExcluding": "5.2.05.27.25",
"matchCriteriaId": "63A5141F-8209-406C-BC3E-1B0CEB9AF4FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:insyde:kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.3",
"versionEndExcluding": "5.3.05.36.25",
"matchCriteriaId": "BCA8A888-C5DC-4550-8494-E72E886A7D33"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:insyde:kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4",
"versionEndExcluding": "5.4.05.44.25",
"matchCriteriaId": "CB9D389D-0C85-4107-8CBD-BD647C7CFFC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:insyde:kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.5.05.52.25",
"matchCriteriaId": "472F2FC3-4BB0-468E-8F24-08C6CED5DA8B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.insyde.com/security-pledge",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.insyde.com/security-pledge/SA-2022064",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}