NetworkPkg/IScsiDxe has remotely exploitable buffer overflows.
References
| Link | Resource |
|---|---|
| https://bugzilla.tianocore.org/show_bug.cgi?id=3356 | Exploit Issue Tracking Vendor Advisory |
| https://www.insyde.com/security-pledge/SA-2023025 | Third Party Advisory |
| https://bugzilla.tianocore.org/show_bug.cgi?id=3356 | Exploit Issue Tracking Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2025/06/msg00007.html | |
| https://www.insyde.com/security-pledge/SA-2023025 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
03 Nov 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 06:17
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://bugzilla.tianocore.org/show_bug.cgi?id=3356 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://www.insyde.com/security-pledge/SA-2023025 - Third Party Advisory |
02 Aug 2023, 17:23
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) https://www.insyde.com/security-pledge/SA-2023025 - Third Party Advisory | |
| CPE | cpe:2.3:o:insyde:kernel:5.4:*:*:*:*:*:*:* cpe:2.3:o:insyde:kernel:5.3:*:*:*:*:*:*:* cpe:2.3:o:insyde:kernel:5.0:*:*:*:*:*:*:* cpe:2.3:o:insyde:kernel:5.1:*:*:*:*:*:*:* cpe:2.3:o:insyde:kernel:5.5:*:*:*:*:*:*:* cpe:2.3:o:insyde:kernel:5.2:*:*:*:*:*:*:* |
|
| First Time |
Insyde kernel
Insyde |
23 Jul 2023, 02:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2021-12-01 18:15
Updated : 2025-11-03 20:15
NVD link : CVE-2021-38575
Mitre link : CVE-2021-38575
CVE.ORG link : CVE-2021-38575
JSON object : View
Products Affected
insyde
- kernel
tianocore
- edk2
