Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
a1d4cd6e by Salvatore Bonaccorso at 2024-01-16T18:56:11+01:00
Add new set of edk2 issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,39 @@
+CVE-2023-45237 [Use of a Weak PseudoRandom Number Generator]
+       - edk2 <unfixed>
+       NOTE: 
https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html
+       NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/2
+CVE-2023-45236 [Predictable TCP Initial Sequence Numbers]
+       - edk2 <unfixed>
+       NOTE: 
https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html
+       NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/2
+CVE-2023-45235 [Buffer overflow when handling Server ID option from a DHCPv6 
proxy Advertise message]
+       - edk2 <unfixed>
+       NOTE: 
https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html
+       NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/2
+CVE-2023-45234 [Buffer overflow when processing DNS Servers option in a DHCPv6 
Advertise message]
+       - edk2 <unfixed>
+       NOTE: 
https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html
+       NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/2
+CVE-2023-45233 [Infinite loop when parsing a PadN option in the Destination 
Options header]
+       - edk2 <unfixed>
+       NOTE: 
https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html
+       NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/2
+CVE-2023-45232 [Infinite loop when parsing unknown options in the Destination 
Options header]
+       - edk2 <unfixed>
+       NOTE: 
https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html
+       NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/2
+CVE-2023-45231 [Out of Bounds read when handling a ND Redirect message with 
truncated options]
+       - edk2 <unfixed>
+       NOTE: 
https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html
+       NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/2
+CVE-2023-45230 [Buffer overflow in the DHCPv6 client via a long Server ID 
option]
+       - edk2 <unfixed>
+       NOTE: 
https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html
+       NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/2
+CVE-2023-45229 [Integer underflow when processing IA_NA/IA_TA options in a 
DHCPv6 Advertise message]
+       - edk2 <unfixed>
+       NOTE: 
https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html
+       NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/2
 CVE-2023-6395
        - mock <removed>
        NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/1



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a1d4cd6e2a00189fb52cdd005e6db6526c5858cc

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a1d4cd6e2a00189fb52cdd005e6db6526c5858cc
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to