From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id B35697803CE for ; Wed, 24 Jan 2024 05:20:42 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=V1q8hls0b64abVerzBjPdTkX7SgVM+aO530LO1M30ZE=; c=relaxed/simple; d=groups.io; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Transfer-Encoding; s=20140610; t=1706073641; v=1; b=QipO4W3edXXg9q/rvNIXShOBtgB8mwVdZ2LBzTslUFCnnED52dXe2LLfN5o5VfIs0SbOr437 TmM3Eqjx/G0HNWhZ5dT/pHETKQvHP7Y8rJbUYePmLMiNPpeLwkG63fFCbNfEduktJorPxwV2vwv w5YMX4RzpTephxdUgRRgrnd8= X-Received: by 127.0.0.2 with SMTP id WJlCYY7687511xxRRtA7v2nv; Tue, 23 Jan 2024 21:20:41 -0800 X-Received: from mail-pl1-f178.google.com (mail-pl1-f178.google.com [209.85.214.178]) by mx.groups.io with SMTP id smtpd.web10.16104.1706073637789147739 for ; Tue, 23 Jan 2024 21:20:37 -0800 X-Received: by mail-pl1-f178.google.com with SMTP id d9443c01a7336-1d7859efea5so322045ad.0 for ; Tue, 23 Jan 2024 21:20:37 -0800 (PST) X-Gm-Message-State: OGM58YmZLIOrWG3gBFwrZuFFx7686176AA= X-Google-Smtp-Source: AGHT+IFrerRX9HU0Ukc+6Hi6HijpL8Aagv+1MLVZoCLAODS7tScJVzllFTlPduj7TIQjq7EBxjZcsw== X-Received: by 2002:a17:902:da82:b0:1d7:3131:4dd6 with SMTP id j2-20020a170902da8200b001d731314dd6mr208695plx.12.1706073637108; Tue, 23 Jan 2024 21:20:37 -0800 (PST) X-Received: from localhost.localdomain ([24.17.138.83]) by smtp.gmail.com with ESMTPSA id w2-20020a170902c78200b001d71f10aa42sm7831709pla.11.2024.01.23.21.20.36 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 23 Jan 2024 21:20:36 -0800 (PST) From: "Doug Flick via groups.io" To: devel@edk2.groups.io Cc: "Douglas Flick [MSFT]" , Saloni Kasbekar , Zachary Clark-williams Subject: [edk2-devel] [PATCH 14/14] NetworkPkg: : Adds a SecurityFix.yaml file Date: Tue, 23 Jan 2024 19:33:37 -0800 Message-ID: <851a15e8da32b3e6ecc43cd92a59c6ff3064a8f2.1706062164.git.doug.edk2@gmail.com> In-Reply-To: References: MIME-Version: 1.0 Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,dougflick@microsoft.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20140610 header.b=QipO4W3e; dmarc=none; spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io This creates / adds a security file that tracks the security fixes found in this package and can be used to find the fixes that were applied. Cc: Saloni Kasbekar Cc: Zachary Clark-williams Signed-off-by: Doug Flick [MSFT] --- NetworkPkg/SecurityFixes.yaml | 123 ++++++++++++++++++++++++++++++++++ 1 file changed, 123 insertions(+) create mode 100644 NetworkPkg/SecurityFixes.yaml diff --git a/NetworkPkg/SecurityFixes.yaml b/NetworkPkg/SecurityFixes.yaml new file mode 100644 index 000000000000..7e900483fec5 --- /dev/null +++ b/NetworkPkg/SecurityFixes.yaml @@ -0,0 +1,123 @@ +## @file=0D +# Security Fixes for SecurityPkg=0D +#=0D +# Copyright (c) Microsoft Corporation=0D +# SPDX-License-Identifier: BSD-2-Clause-Patent=0D +##=0D +CVE_2023_45229:=0D + commit_titles:=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45229 Patch"=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45229 Unit Tests"=0D + cve: CVE-2023-45229=0D + date_reported: 2023-08-28 13:56 UTC=0D + description: "Bug 01 - edk2/NetworkPkg: Out-of-bounds read when processi= ng IA_NA/IA_TA options in a DHCPv6 Advertise message"=0D + note:=0D + files_impacted:=0D + - NetworkPkg\Dhcp6Dxe\Dhcp6Io.c=0D + - NetworkPkg\Dhcp6Dxe\Dhcp6Impl.h=0D + links:=0D + - https://bugzilla.tianocore.org/show_bug.cgi?id=3D4534=0D + - https://nvd.nist.gov/vuln/detail/CVE-2023-45229=0D + - http://www.openwall.com/lists/oss-security/2024/01/16/2=0D + - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Conce= pts.html=0D + - https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianoco= res-edk-ii-ipv6-network-stack.html=0D +CVE_2023_45230:=0D + commit_titles:=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45230 Patch"=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45230 Unit Tests"=0D + cve: CVE-2023-45230=0D + date_reported: 2023-08-28 13:56 UTC=0D + description: "Bug 02 - edk2/NetworkPkg: Buffer overflow in the DHCPv6 cl= ient via a long Server ID option"=0D + note:=0D + files_impacted:=0D + - NetworkPkg\Dhcp6Dxe\Dhcp6Io.c=0D + - NetworkPkg\Dhcp6Dxe\Dhcp6Impl.h=0D + links:=0D + - https://bugzilla.tianocore.org/show_bug.cgi?id=3D4535=0D + - https://nvd.nist.gov/vuln/detail/CVE-2023-45230=0D + - http://www.openwall.com/lists/oss-security/2024/01/16/2=0D + - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Conce= pts.html=0D + - https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianoco= res-edk-ii-ipv6-network-stack.html=0D +CVE_2023_45231:=0D + commit_titles:=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45231 Patch"=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45231 Unit Tests"=0D + cve: CVE-2023-45231=0D + date_reported: 2023-08-28 13:56 UTC=0D + description: "Bug 03 - edk2/NetworkPkg: Out-of-bounds read when handling= a ND Redirect message with truncated options"=0D + note:=0D + files_impacted:=0D + - NetworkPkg/Ip6Dxe/Ip6Option.c=0D + links:=0D + - https://bugzilla.tianocore.org/show_bug.cgi?id=3D4536=0D + - https://nvd.nist.gov/vuln/detail/CVE-2023-45231=0D + - http://www.openwall.com/lists/oss-security/2024/01/16/2=0D + - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Conce= pts.html=0D + - https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianoco= res-edk-ii-ipv6-network-stack.html=0D +CVE_2023_45232:=0D + commit_titles:=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45232 Patch"=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45232 Unit Tests"=0D + cve: CVE-2023-45232=0D + date_reported: 2023-08-28 13:56 UTC=0D + description: "Bug 04 - edk2/NetworkPkg: Infinite loop when parsing unkno= wn options in the Destination Options header"=0D + note:=0D + files_impacted:=0D + - NetworkPkg/Ip6Dxe/Ip6Option.c=0D + - NetworkPkg/Ip6Dxe/Ip6Option.h=0D + links:=0D + - https://bugzilla.tianocore.org/show_bug.cgi?id=3D4537=0D + - https://nvd.nist.gov/vuln/detail/CVE-2023-45232=0D + - http://www.openwall.com/lists/oss-security/2024/01/16/2=0D + - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Conce= pts.html=0D + - https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianoco= res-edk-ii-ipv6-network-stack.html=0D +CVE_2023_45233:=0D + commit_titles:=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45232 Patch"=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45232 Unit Tests"=0D + cve: CVE-2023-45233=0D + date_reported: 2023-08-28 13:56 UTC=0D + description: "Bug 05 - edk2/NetworkPkg: Infinite loop when parsing a Pad= N option in the Destination Options header "=0D + note: This was fixed along with CVE-2023-45233=0D + files_impacted:=0D + - NetworkPkg/Ip6Dxe/Ip6Option.c=0D + - NetworkPkg/Ip6Dxe/Ip6Option.h=0D + links:=0D + - https://bugzilla.tianocore.org/show_bug.cgi?id=3D4538=0D + - https://nvd.nist.gov/vuln/detail/CVE-2023-45233=0D + - http://www.openwall.com/lists/oss-security/2024/01/16/2=0D + - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Conce= pts.html=0D + - https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianoco= res-edk-ii-ipv6-network-stack.html=0D +CVE_2023_45234:=0D + commit_titles:=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45234 Patch"=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45234 Unit Tests"=0D + cve: CVE-2023-45234=0D + date_reported: 2023-08-28 13:56 UTC=0D + description: "Bug 06 - edk2/NetworkPkg: Buffer overflow when processing = DNS Servers option in a DHCPv6 Advertise message"=0D + note:=0D + files_impacted:=0D + - NetworkPkg/UefiPxeBcDxe/PxeBcDhcp6.c=0D + links:=0D + - https://bugzilla.tianocore.org/show_bug.cgi?id=3D4539=0D + - https://nvd.nist.gov/vuln/detail/CVE-2023-45234=0D + - http://www.openwall.com/lists/oss-security/2024/01/16/2=0D + - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Conce= pts.html=0D + - https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianoco= res-edk-ii-ipv6-network-stack.html=0D +CVE_2023_45235:=0D + commit_titles:=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45235 Patch"=0D + - "NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45235 Unit Tests"=0D + cve: CVE-2023-45235=0D + date_reported: 2023-08-28 13:56 UTC=0D + description: "Bug 07 - edk2/NetworkPkg: Buffer overflow when handling Se= rver ID option from a DHCPv6 proxy Advertise message"=0D + note:=0D + files_impacted:=0D + - NetworkPkg/UefiPxeBcDxe/PxeBcDhcp6.c=0D + - NetworkPkg/UefiPxeBcDxe/PxeBcDhcp6.h=0D + links:=0D + - https://bugzilla.tianocore.org/show_bug.cgi?id=3D4540=0D + - https://nvd.nist.gov/vuln/detail/CVE-2023-45235=0D + - http://www.openwall.com/lists/oss-security/2024/01/16/2=0D + - http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Conce= pts.html=0D + - https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianoco= res-edk-ii-ipv6-network-stack.html=0D --=20 2.43.0 -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#114266): https://edk2.groups.io/g/devel/message/114266 Mute This Topic: https://groups.io/mt/103926745/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=-