DEBIAN-CVE-2023-45232

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2023-45232
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-45232.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-45232
Upstream
Published
2024-01-16T16:15:12Z
Modified
2025-09-19T07:33:27.944358Z
Summary
[none]
Details

EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability.

References

Affected packages

Debian:11 / edk2

Package

Name
edk2
Purl
pkg:deb/debian/edk2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2020.11-2+deb11u3

Affected versions

2020.*

2020.11-2
2020.11-2+deb11u1
2020.11-2+deb11u2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / edk2

Package

Name
edk2
Purl
pkg:deb/debian/edk2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2022.11-6+deb12u1

Affected versions

2022.*

2022.11-6

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / edk2

Package

Name
edk2
Purl
pkg:deb/debian/edk2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2023.11-6

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / edk2

Package

Name
edk2
Purl
pkg:deb/debian/edk2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2023.11-6

Ecosystem specific

{
    "urgency": "not yet assigned"
}