From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id 5A6C674003B for ; Thu, 25 Jan 2024 23:06:45 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=OJUctgT/9ZtzZhufHQmGMzM5BCyR4bGv86rQk58ephc=; c=relaxed/simple; d=groups.io; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Transfer-Encoding; s=20140610; t=1706224004; v=1; b=eVJkD6kEJOj2/cZ5wwOFpX0yaA6DSlnYQTB2LcJh21dE4bgrAk1ERf2/mHEyDsDWUsaKz6cP px0jxZG1qu5Xu5W5eXmCwMsu0MIuKWXMnTS6XhYylWdh+Vxa8SjPYJG3ZcyEB8YyddRuzGv9uWE pCtWkoFjgc5IM0ScTIyYGrK4= X-Received: by 127.0.0.2 with SMTP id OIu2YY7687511xOd07CfcAMw; Thu, 25 Jan 2024 15:06:44 -0800 X-Received: from mail-pl1-f173.google.com (mail-pl1-f173.google.com [209.85.214.173]) by mx.groups.io with SMTP id smtpd.web11.794.1706224000316895407 for ; Thu, 25 Jan 2024 15:06:40 -0800 X-Received: by mail-pl1-f173.google.com with SMTP id d9443c01a7336-1d71cb97937so47981405ad.3 for ; Thu, 25 Jan 2024 15:06:40 -0800 (PST) X-Gm-Message-State: qCGZZ4RJCht3Tw6MoJVmTBIjx7686176AA= X-Google-Smtp-Source: AGHT+IE1D6aZtSfrXQbna9pyjvA9qBubdAx1AxQR2a3GCRlvsoSZF+pF8FNK74QzHu5dRKtAGcuXJA== X-Received: by 2002:a17:902:d507:b0:1d5:6648:5f1 with SMTP id b7-20020a170902d50700b001d5664805f1mr560882plg.36.1706223999579; Thu, 25 Jan 2024 15:06:39 -0800 (PST) X-Received: from localhost.localdomain ([24.17.138.83]) by smtp.gmail.com with ESMTPSA id jh1-20020a170903328100b001d752c4f180sm16779plb.94.2024.01.25.15.06.38 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 25 Jan 2024 15:06:39 -0800 (PST) From: "Doug Flick via groups.io" To: devel@edk2.groups.io Cc: "Douglas Flick [MSFT]" , Saloni Kasbekar , Zachary Clark-williams Subject: [edk2-devel] [PATCH v2 15/15] NetworkPkg: : Adds a SecurityFix.yaml file Date: Thu, 25 Jan 2024 13:54:57 -0800 Message-ID: <7cff1e0c867f716759a3aea9a67e3ded0ac59620.1706219324.git.doug.edk2@gmail.com> In-Reply-To: References: MIME-Version: 1.0 Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,dougflick@microsoft.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20140610 header.b=eVJkD6kE; dmarc=none; spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io This creates / adds a security file that tracks the security fixes found in this package and can be used to find the fixes that were applied. Cc: Saloni Kasbekar Cc: Zachary Clark-williams Signed-off-by: Doug Flick [MSFT] --- NetworkPkg/SecurityFixes.yaml | 123 ++++++++++++++++++++++++++++++++++ 1 file changed, 123 insertions(+) create mode 100644 NetworkPkg/SecurityFixes.yaml diff --git a/NetworkPkg/SecurityFixes.yaml b/NetworkPkg/SecurityFixes.yaml new file mode 100644 index 000000000000..7e900483fec5 --- /dev/null +++ b/NetworkPkg/SecurityFixes.yaml @@ -0,0 +1,123 @@ +## @file=0D +# Security Fixes for SecurityPkg=0D +#=0D +# Copyright (c) Microsoft Corporation=0D +# SPDX-License-Identifier: BSD-2-Clause-Patent=0D +##=0D +CVE_2023_45229:=0D + commit_titles:=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45229 Patch"=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45229 Unit Tests"=0D + cve: CVE-2023-45229=0D + date_reported: 2023-08-28 13:56 UTC=0D + description: "Bug 01 - edk2/NetworkPkg: Out-of-bounds read when processi= ng IA_NA/IA_TA options in a DHCPv6 Advertise message"=0D + note:=0D + files_impacted:=0D + - NetworkPkg\Dhcp6Dxe\Dhcp6Io.c=0D + - NetworkPkg\Dhcp6Dxe\Dhcp6Impl.h=0D + links:=0D + - https://bugzilla.tianocore.org/show_bug.cgi?id=3D4534=0D + - https://nvd.nist.gov/vuln/detail/CVE-2023-45229=0D + - http://www.openwall.com/lists/oss-security/2024/01/16/2=0D + - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Conce= pts.html=0D + - https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianoco= res-edk-ii-ipv6-network-stack.html=0D +CVE_2023_45230:=0D + commit_titles:=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45230 Patch"=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45230 Unit Tests"=0D + cve: CVE-2023-45230=0D + date_reported: 2023-08-28 13:56 UTC=0D + description: "Bug 02 - edk2/NetworkPkg: Buffer overflow in the DHCPv6 cl= ient via a long Server ID option"=0D + note:=0D + files_impacted:=0D + - NetworkPkg\Dhcp6Dxe\Dhcp6Io.c=0D + - NetworkPkg\Dhcp6Dxe\Dhcp6Impl.h=0D + links:=0D + - https://bugzilla.tianocore.org/show_bug.cgi?id=3D4535=0D + - https://nvd.nist.gov/vuln/detail/CVE-2023-45230=0D + - http://www.openwall.com/lists/oss-security/2024/01/16/2=0D + - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Conce= pts.html=0D + - https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianoco= res-edk-ii-ipv6-network-stack.html=0D +CVE_2023_45231:=0D + commit_titles:=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45231 Patch"=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45231 Unit Tests"=0D + cve: CVE-2023-45231=0D + date_reported: 2023-08-28 13:56 UTC=0D + description: "Bug 03 - edk2/NetworkPkg: Out-of-bounds read when handling= a ND Redirect message with truncated options"=0D + note:=0D + files_impacted:=0D + - NetworkPkg/Ip6Dxe/Ip6Option.c=0D + links:=0D + - https://bugzilla.tianocore.org/show_bug.cgi?id=3D4536=0D + - https://nvd.nist.gov/vuln/detail/CVE-2023-45231=0D + - http://www.openwall.com/lists/oss-security/2024/01/16/2=0D + - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Conce= pts.html=0D + - https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianoco= res-edk-ii-ipv6-network-stack.html=0D +CVE_2023_45232:=0D + commit_titles:=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45232 Patch"=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45232 Unit Tests"=0D + cve: CVE-2023-45232=0D + date_reported: 2023-08-28 13:56 UTC=0D + description: "Bug 04 - edk2/NetworkPkg: Infinite loop when parsing unkno= wn options in the Destination Options header"=0D + note:=0D + files_impacted:=0D + - NetworkPkg/Ip6Dxe/Ip6Option.c=0D + - NetworkPkg/Ip6Dxe/Ip6Option.h=0D + links:=0D + - https://bugzilla.tianocore.org/show_bug.cgi?id=3D4537=0D + - https://nvd.nist.gov/vuln/detail/CVE-2023-45232=0D + - http://www.openwall.com/lists/oss-security/2024/01/16/2=0D + - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Conce= pts.html=0D + - https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianoco= res-edk-ii-ipv6-network-stack.html=0D +CVE_2023_45233:=0D + commit_titles:=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45232 Patch"=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45232 Unit Tests"=0D + cve: CVE-2023-45233=0D + date_reported: 2023-08-28 13:56 UTC=0D + description: "Bug 05 - edk2/NetworkPkg: Infinite loop when parsing a Pad= N option in the Destination Options header "=0D + note: This was fixed along with CVE-2023-45233=0D + files_impacted:=0D + - NetworkPkg/Ip6Dxe/Ip6Option.c=0D + - NetworkPkg/Ip6Dxe/Ip6Option.h=0D + links:=0D + - https://bugzilla.tianocore.org/show_bug.cgi?id=3D4538=0D + - https://nvd.nist.gov/vuln/detail/CVE-2023-45233=0D + - http://www.openwall.com/lists/oss-security/2024/01/16/2=0D + - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Conce= pts.html=0D + - https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianoco= res-edk-ii-ipv6-network-stack.html=0D +CVE_2023_45234:=0D + commit_titles:=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45234 Patch"=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45234 Unit Tests"=0D + cve: CVE-2023-45234=0D + date_reported: 2023-08-28 13:56 UTC=0D + description: "Bug 06 - edk2/NetworkPkg: Buffer overflow when processing = DNS Servers option in a DHCPv6 Advertise message"=0D + note:=0D + files_impacted:=0D + - NetworkPkg/UefiPxeBcDxe/PxeBcDhcp6.c=0D + links:=0D + - https://bugzilla.tianocore.org/show_bug.cgi?id=3D4539=0D + - https://nvd.nist.gov/vuln/detail/CVE-2023-45234=0D + - http://www.openwall.com/lists/oss-security/2024/01/16/2=0D + - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Conce= pts.html=0D + - https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianoco= res-edk-ii-ipv6-network-stack.html=0D +CVE_2023_45235:=0D + commit_titles:=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45235 Patch"=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45235 Unit Tests"=0D + cve: CVE-2023-45235=0D + date_reported: 2023-08-28 13:56 UTC=0D + description: "Bug 07 - edk2/NetworkPkg: Buffer overflow when handling Se= rver ID option from a DHCPv6 proxy Advertise message"=0D + note:=0D + files_impacted:=0D + - NetworkPkg/UefiPxeBcDxe/PxeBcDhcp6.c=0D + - NetworkPkg/UefiPxeBcDxe/PxeBcDhcp6.h=0D + links:=0D + - https://bugzilla.tianocore.org/show_bug.cgi?id=3D4540=0D + - https://nvd.nist.gov/vuln/detail/CVE-2023-45235=0D + - http://www.openwall.com/lists/oss-security/2024/01/16/2=0D + - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Conce= pts.html=0D + - https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianoco= res-edk-ii-ipv6-network-stack.html=0D --=20 2.43.0 -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#114477): https://edk2.groups.io/g/devel/message/114477 Mute This Topic: https://groups.io/mt/103964993/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=-