An issue was discovered in PnpSmm in Insyde InsydeH2O with kernel 5.0 through 5.6. There is a possible out-of-bounds access in the SMM communication buffer, leading to tampering. The PNP-related SMI sub-functions do not verify data size before getting it from the communication buffer, which could lead to possible circumstances where the data immediately following the command buffer could be destroyed with a fixed value. This is fixed in kernel 5.2 v05.28.45, kernel 5.3 v05.37.45, kernel 5.4 v05.45.45, kernel 5.5 v05.53.45, and kernel 5.6 v05.60.45.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.insyde.com/security-pledge/SA-2023067 |
![]() ![]() |
History
Wed, 20 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-787 | |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2024-04-26T00:00:00
Updated: 2024-11-20T15:50:18.349Z
Reserved: 2023-11-05T00:00:00
Link: CVE-2023-47252

Updated: 2024-08-02T21:09:35.794Z

Status : Awaiting Analysis
Published: 2024-04-26T03:15:06.617
Modified: 2024-11-21T08:30:03.193
Link: CVE-2023-47252

No data.