First published: Tue Jan 16 2024(Updated: )
<a href="https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html">https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html</a> <a href="https://github.com/advisories/GHSA-pr27-mhpp-2ccr">https://github.com/advisories/GHSA-pr27-mhpp-2ccr</a>
Credit: infosec@edk2.groups.io infosec@edk2.groups.io
Affected Software | Affected Version | How to fix |
---|---|---|
debian/edk2 | <=0~20181115.85588389-3+deb10u3<=2020.11-2+deb11u1<=2020.11-2+deb11u2<=2022.11-6 | 2022.11-6+deb12u1 2024.02-2 |
ubuntu/edk2 | <0~20191122. | 0~20191122. |
ubuntu/edk2 | <2022.02-3ubuntu0.22.04.2 | 2022.02-3ubuntu0.22.04.2 |
ubuntu/edk2 | <2023.05-2ubuntu0.1 | 2023.05-2ubuntu0.1 |
Tianocore EDK II | <=202311 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45231 has been assigned a high severity rating due to its potential impact on system security.
To mitigate CVE-2023-45231, upgrade to one of the updated versions of EDK2 as specified in the vendor advisories.
CVE-2023-45231 affects the Tianocore EDK2 software and specific versions of Ubuntu and Debian packages.
CVE-2023-45231 could allow an attacker to execute arbitrary code or cause a denial of service through vulnerabilities in the IPv6 network stack.
CVE-2023-45231 is not a zero-day exploit as it has been publicly disclosed and mitigations are available.