File _patchinfo of Package patchinfo.42234

<patchinfo incident="42234">
  <issue tracker="cve" id="2023-45232"/>
  <issue tracker="cve" id="2023-45235"/>
  <issue tracker="cve" id="2023-45231"/>
  <issue tracker="cve" id="2023-45234"/>
  <issue tracker="cve" id="2023-45233"/>
  <issue tracker="bnc" id="1218882">VUL-0: CVE-2023-45232: edk2, ovmf: Infinite loop when parsing unknown options in the Destination Options header</issue>
  <issue tracker="bnc" id="1218885">VUL-0: CVE-2023-45235: edk2, ovmf: Buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message</issue>
  <issue tracker="bnc" id="1218883">VUL-0: CVE-2023-45233: edk2, ovmf: Infinite loop when parsing a PadN option in the Destination Options header</issue>
  <issue tracker="bnc" id="1218881">VUL-0: CVE-2023-45231: edk2, ovmf: Out of Bounds read when handling a ND Redirect message with truncated options</issue>
  <issue tracker="bnc" id="1218884">VUL-0: CVE-2023-45234: edk2, ovmf: Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message</issue>
  <packager>joeyli</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for ovmf</summary>
  <description>This update for ovmf fixes the following issues:

- CVE-2023-45231: Fixed out of bounds read when handling a ND Redirect message with truncated options (bsc#1218881).
- CVE-2023-45232: Fixed infinite loop when parsing unknown options in the Destination Options header (bsc#1218882).
- CVE-2023-45233: Fixed infinite loop when parsing a PadN option in the Destination Options header (bsc#1218883).
- CVE-2023-45234: Fixed buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message (bsc#1218884).
- CVE-2023-45235: Fixed buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message (bsc#1218885).
</description>
</patchinfo>
openSUSE Build Service is sponsored by