File _patchinfo of Package patchinfo.42234
<patchinfo incident="42234"> <issue tracker="cve" id="2023-45232"/> <issue tracker="cve" id="2023-45235"/> <issue tracker="cve" id="2023-45231"/> <issue tracker="cve" id="2023-45234"/> <issue tracker="cve" id="2023-45233"/> <issue tracker="bnc" id="1218882">VUL-0: CVE-2023-45232: edk2, ovmf: Infinite loop when parsing unknown options in the Destination Options header</issue> <issue tracker="bnc" id="1218885">VUL-0: CVE-2023-45235: edk2, ovmf: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message</issue> <issue tracker="bnc" id="1218883">VUL-0: CVE-2023-45233: edk2, ovmf: Infinite loop when parsing a PadN option in the Destination Options header</issue> <issue tracker="bnc" id="1218881">VUL-0: CVE-2023-45231: edk2, ovmf: Out of Bounds read when handling a ND Redirect message with truncated options</issue> <issue tracker="bnc" id="1218884">VUL-0: CVE-2023-45234: edk2, ovmf: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</issue> <packager>joeyli</packager> <rating>important</rating> <category>security</category> <summary>Security update for ovmf</summary> <description>This update for ovmf fixes the following issues: - CVE-2023-45231: Fixed out of bounds read when handling a ND Redirect message with truncated options (bsc#1218881). - CVE-2023-45232: Fixed infinite loop when parsing unknown options in the Destination Options header (bsc#1218882). - CVE-2023-45233: Fixed infinite loop when parsing a PadN option in the Destination Options header (bsc#1218883). - CVE-2023-45234: Fixed buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message (bsc#1218884). - CVE-2023-45235: Fixed buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message (bsc#1218885). </description> </patchinfo>