Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: a1d4cd6e by Salvatore Bonaccorso at 2024-01-16T18:56:11+01:00 Add new set of edk2 issues - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,3 +1,39 @@ +CVE-2023-45237 [Use of a Weak PseudoRandom Number Generator] + - edk2 <unfixed> + NOTE: https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html + NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/2 +CVE-2023-45236 [Predictable TCP Initial Sequence Numbers] + - edk2 <unfixed> + NOTE: https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html + NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/2 +CVE-2023-45235 [Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message] + - edk2 <unfixed> + NOTE: https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html + NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/2 +CVE-2023-45234 [Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message] + - edk2 <unfixed> + NOTE: https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html + NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/2 +CVE-2023-45233 [Infinite loop when parsing a PadN option in the Destination Options header] + - edk2 <unfixed> + NOTE: https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html + NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/2 +CVE-2023-45232 [Infinite loop when parsing unknown options in the Destination Options header] + - edk2 <unfixed> + NOTE: https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html + NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/2 +CVE-2023-45231 [Out of Bounds read when handling a ND Redirect message with truncated options] + - edk2 <unfixed> + NOTE: https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html + NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/2 +CVE-2023-45230 [Buffer overflow in the DHCPv6 client via a long Server ID option] + - edk2 <unfixed> + NOTE: https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html + NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/2 +CVE-2023-45229 [Integer underflow when processing IA_NA/IA_TA options in a DHCPv6 Advertise message] + - edk2 <unfixed> + NOTE: https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html + NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/2 CVE-2023-6395 - mock <removed> NOTE: https://www.openwall.com/lists/oss-security/2024/01/16/1 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a1d4cd6e2a00189fb52cdd005e6db6526c5858cc -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a1d4cd6e2a00189fb52cdd005e6db6526c5858cc You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list [email protected] https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
